Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20231025-en -
resource tags
arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system -
submitted
31/10/2023, 18:48
Static task
static1
General
-
Target
ac015ea80a2d51922711029ac5f52a40af4163f548734754fe2cf399581decac.exe
-
Size
7.1MB
-
MD5
f621e8f38dff3d36f286a3cda7096e52
-
SHA1
08c695ebf684cfa0388852fa6017443952a41b24
-
SHA256
ac015ea80a2d51922711029ac5f52a40af4163f548734754fe2cf399581decac
-
SHA512
a7441b2213929b2dbccb709ab290cd3a271e9ce6c90f14574e3f07275081196c1b546c06573b7d53fa7dcd26f00d552ce3029619cb538b34b8df52d32e5f81eb
-
SSDEEP
196608:91OyqPSSBSG+2UjbsVzWIwONGVulZNqQiQn0miMsr+bI6:3OcSs92zFwr4lZNvLFI+c6
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 34 5088 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Control Panel\International\Geo\Nation tylgiFD.exe -
Executes dropped EXE 4 IoCs
pid Process 4284 Install.exe 664 Install.exe 4904 kXgKFYe.exe 2616 tylgiFD.exe -
Loads dropped DLL 1 IoCs
pid Process 5088 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json tylgiFD.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json tylgiFD.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini tylgiFD.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_E83F1CC07F729E027C8598AD1DA25FD6 tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_90E6705D31DA2761A44BA5F5F40B2AEC tylgiFD.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol kXgKFYe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_B67A81AFAE089B928194572649A22563 tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_B67A81AFAE089B928194572649A22563 tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini kXgKFYe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_90E6705D31DA2761A44BA5F5F40B2AEC tylgiFD.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_E83F1CC07F729E027C8598AD1DA25FD6 tylgiFD.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol tylgiFD.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8C0A4A9E1CEFEB34D84E7975A8A5D28F tylgiFD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8C0A4A9E1CEFEB34D84E7975A8A5D28F tylgiFD.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak tylgiFD.exe File created C:\Program Files (x86)\jOQmpEGyMvtU2\QEzvSmsHSvnSz.dll tylgiFD.exe File created C:\Program Files (x86)\osWDoWbqnTFGC\qNutJTA.xml tylgiFD.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi tylgiFD.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi tylgiFD.exe File created C:\Program Files (x86)\jOQmpEGyMvtU2\NKkzRCV.xml tylgiFD.exe File created C:\Program Files (x86)\BLexGiqdsuYvaXVnAcR\ETovNqw.xml tylgiFD.exe File created C:\Program Files (x86)\CAjDzTsRwiUn\xHoejVG.dll tylgiFD.exe File created C:\Program Files (x86)\TvkkUqnZU\EvmHvS.dll tylgiFD.exe File created C:\Program Files (x86)\TvkkUqnZU\FVOPZwK.xml tylgiFD.exe File created C:\Program Files (x86)\BLexGiqdsuYvaXVnAcR\JxzmpRB.dll tylgiFD.exe File created C:\Program Files (x86)\osWDoWbqnTFGC\EADzyGT.dll tylgiFD.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja tylgiFD.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak tylgiFD.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\biLFSVxFnVnSpHlhoN.job schtasks.exe File created C:\Windows\Tasks\jGHXcBuFeUKONdtKg.job schtasks.exe File created C:\Windows\Tasks\IgXFFhGQnqYgGHX.job schtasks.exe File created C:\Windows\Tasks\RMddMXTgxvDdLvxMd.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4868 schtasks.exe 2012 schtasks.exe 4924 schtasks.exe 2512 schtasks.exe 2848 schtasks.exe 4216 schtasks.exe 4828 schtasks.exe 1864 schtasks.exe 5012 schtasks.exe 872 schtasks.exe 4684 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" tylgiFD.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache tylgiFD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing tylgiFD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{8555b6b6-0000-0000-0000-d01200000000}\NukeOnDelete = "0" tylgiFD.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" tylgiFD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" tylgiFD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "1" tylgiFD.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 tylgiFD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer tylgiFD.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" tylgiFD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix tylgiFD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ tylgiFD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume tylgiFD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{8555b6b6-0000-0000-0000-d01200000000}\MaxCapacity = "14116" tylgiFD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3356 powershell.EXE 3356 powershell.EXE 3356 powershell.EXE 656 powershell.exe 656 powershell.exe 656 powershell.exe 2936 powershell.exe 2936 powershell.exe 2936 powershell.exe 5092 powershell.EXE 5092 powershell.EXE 5092 powershell.EXE 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe 2616 tylgiFD.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3356 powershell.EXE Token: SeDebugPrivilege 656 powershell.exe Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 5092 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 520 wrote to memory of 4284 520 ac015ea80a2d51922711029ac5f52a40af4163f548734754fe2cf399581decac.exe 71 PID 520 wrote to memory of 4284 520 ac015ea80a2d51922711029ac5f52a40af4163f548734754fe2cf399581decac.exe 71 PID 520 wrote to memory of 4284 520 ac015ea80a2d51922711029ac5f52a40af4163f548734754fe2cf399581decac.exe 71 PID 4284 wrote to memory of 664 4284 Install.exe 72 PID 4284 wrote to memory of 664 4284 Install.exe 72 PID 4284 wrote to memory of 664 4284 Install.exe 72 PID 664 wrote to memory of 4956 664 Install.exe 74 PID 664 wrote to memory of 4956 664 Install.exe 74 PID 664 wrote to memory of 4956 664 Install.exe 74 PID 664 wrote to memory of 5096 664 Install.exe 76 PID 664 wrote to memory of 5096 664 Install.exe 76 PID 664 wrote to memory of 5096 664 Install.exe 76 PID 4956 wrote to memory of 1796 4956 forfiles.exe 78 PID 4956 wrote to memory of 1796 4956 forfiles.exe 78 PID 4956 wrote to memory of 1796 4956 forfiles.exe 78 PID 5096 wrote to memory of 4372 5096 forfiles.exe 79 PID 5096 wrote to memory of 4372 5096 forfiles.exe 79 PID 5096 wrote to memory of 4372 5096 forfiles.exe 79 PID 1796 wrote to memory of 1420 1796 cmd.exe 80 PID 1796 wrote to memory of 1420 1796 cmd.exe 80 PID 1796 wrote to memory of 1420 1796 cmd.exe 80 PID 4372 wrote to memory of 2052 4372 cmd.exe 81 PID 4372 wrote to memory of 2052 4372 cmd.exe 81 PID 4372 wrote to memory of 2052 4372 cmd.exe 81 PID 1796 wrote to memory of 3536 1796 cmd.exe 82 PID 1796 wrote to memory of 3536 1796 cmd.exe 82 PID 1796 wrote to memory of 3536 1796 cmd.exe 82 PID 4372 wrote to memory of 488 4372 cmd.exe 83 PID 4372 wrote to memory of 488 4372 cmd.exe 83 PID 4372 wrote to memory of 488 4372 cmd.exe 83 PID 664 wrote to memory of 5012 664 Install.exe 84 PID 664 wrote to memory of 5012 664 Install.exe 84 PID 664 wrote to memory of 5012 664 Install.exe 84 PID 664 wrote to memory of 3692 664 Install.exe 86 PID 664 wrote to memory of 3692 664 Install.exe 86 PID 664 wrote to memory of 3692 664 Install.exe 86 PID 3356 wrote to memory of 5092 3356 powershell.EXE 90 PID 3356 wrote to memory of 5092 3356 powershell.EXE 90 PID 664 wrote to memory of 4152 664 Install.exe 95 PID 664 wrote to memory of 4152 664 Install.exe 95 PID 664 wrote to memory of 4152 664 Install.exe 95 PID 664 wrote to memory of 2848 664 Install.exe 97 PID 664 wrote to memory of 2848 664 Install.exe 97 PID 664 wrote to memory of 2848 664 Install.exe 97 PID 4904 wrote to memory of 656 4904 kXgKFYe.exe 100 PID 4904 wrote to memory of 656 4904 kXgKFYe.exe 100 PID 4904 wrote to memory of 656 4904 kXgKFYe.exe 100 PID 656 wrote to memory of 3548 656 powershell.exe 102 PID 656 wrote to memory of 3548 656 powershell.exe 102 PID 656 wrote to memory of 3548 656 powershell.exe 102 PID 3548 wrote to memory of 440 3548 cmd.exe 103 PID 3548 wrote to memory of 440 3548 cmd.exe 103 PID 3548 wrote to memory of 440 3548 cmd.exe 103 PID 656 wrote to memory of 2676 656 powershell.exe 104 PID 656 wrote to memory of 2676 656 powershell.exe 104 PID 656 wrote to memory of 2676 656 powershell.exe 104 PID 656 wrote to memory of 216 656 powershell.exe 105 PID 656 wrote to memory of 216 656 powershell.exe 105 PID 656 wrote to memory of 216 656 powershell.exe 105 PID 656 wrote to memory of 4108 656 powershell.exe 106 PID 656 wrote to memory of 4108 656 powershell.exe 106 PID 656 wrote to memory of 4108 656 powershell.exe 106 PID 656 wrote to memory of 2540 656 powershell.exe 107 PID 656 wrote to memory of 2540 656 powershell.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac015ea80a2d51922711029ac5f52a40af4163f548734754fe2cf399581decac.exe"C:\Users\Admin\AppData\Local\Temp\ac015ea80a2d51922711029ac5f52a40af4163f548734754fe2cf399581decac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\7zS8AEA.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\7zS8BB5.tmp\Install.exe.\Install.exe /Mdidrp "525403" /S3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1420
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:3536
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:2052
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:488
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gTXJNixhr" /SC once /ST 10:54:13 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:5012
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gTXJNixhr"4⤵PID:3692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gTXJNixhr"4⤵PID:4152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "biLFSVxFnVnSpHlhoN" /SC once /ST 18:49:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\AfitxGSikBEtZaEPv\KMYXcVMmxPLSXrE\kXgKFYe.exe\" DG /hUsite_iddWo 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2848
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:5092
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3388
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:3684
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\AfitxGSikBEtZaEPv\KMYXcVMmxPLSXrE\kXgKFYe.exeC:\Users\Admin\AppData\Local\Temp\AfitxGSikBEtZaEPv\KMYXcVMmxPLSXrE\kXgKFYe.exe DG /hUsite_iddWo 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:440
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:2676
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4108
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:2540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4808
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:3408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:2260
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4420
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:2520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:2512
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:1240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:1176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:2400
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4228
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:4984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4624
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:4816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:3916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:3212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:3472
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BLexGiqdsuYvaXVnAcR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BLexGiqdsuYvaXVnAcR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CAjDzTsRwiUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CAjDzTsRwiUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\TvkkUqnZU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\TvkkUqnZU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jOQmpEGyMvtU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jOQmpEGyMvtU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\osWDoWbqnTFGC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\osWDoWbqnTFGC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\SiCNTTjMJAtvwHVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\SiCNTTjMJAtvwHVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\AfitxGSikBEtZaEPv\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\AfitxGSikBEtZaEPv\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\LDjUlqbegEvwPzDv\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\LDjUlqbegEvwPzDv\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BLexGiqdsuYvaXVnAcR" /t REG_DWORD /d 0 /reg:323⤵PID:4524
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BLexGiqdsuYvaXVnAcR" /t REG_DWORD /d 0 /reg:324⤵PID:4068
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BLexGiqdsuYvaXVnAcR" /t REG_DWORD /d 0 /reg:643⤵PID:1632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CAjDzTsRwiUn" /t REG_DWORD /d 0 /reg:323⤵PID:4800
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CAjDzTsRwiUn" /t REG_DWORD /d 0 /reg:643⤵PID:3692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TvkkUqnZU" /t REG_DWORD /d 0 /reg:323⤵PID:4592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TvkkUqnZU" /t REG_DWORD /d 0 /reg:643⤵PID:4508
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jOQmpEGyMvtU2" /t REG_DWORD /d 0 /reg:323⤵PID:3172
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jOQmpEGyMvtU2" /t REG_DWORD /d 0 /reg:643⤵PID:2252
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\osWDoWbqnTFGC" /t REG_DWORD /d 0 /reg:323⤵PID:3032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\osWDoWbqnTFGC" /t REG_DWORD /d 0 /reg:643⤵PID:4900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\SiCNTTjMJAtvwHVB /t REG_DWORD /d 0 /reg:323⤵PID:1304
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\SiCNTTjMJAtvwHVB /t REG_DWORD /d 0 /reg:643⤵PID:3976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:1996
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\AfitxGSikBEtZaEPv /t REG_DWORD /d 0 /reg:323⤵PID:1584
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\AfitxGSikBEtZaEPv /t REG_DWORD /d 0 /reg:643⤵PID:2960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\LDjUlqbegEvwPzDv /t REG_DWORD /d 0 /reg:323⤵PID:4548
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\LDjUlqbegEvwPzDv /t REG_DWORD /d 0 /reg:643⤵PID:5004
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gvrYbLTNP" /SC once /ST 05:54:17 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:872
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gvrYbLTNP"2⤵PID:368
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gvrYbLTNP"2⤵PID:820
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jGHXcBuFeUKONdtKg" /SC once /ST 15:29:21 /RU "SYSTEM" /TR "\"C:\Windows\Temp\LDjUlqbegEvwPzDv\decWFNdVWcTWzNJ\tylgiFD.exe\" Mg /jDsite_idxke 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4684
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "jGHXcBuFeUKONdtKg"2⤵PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4468
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:2904
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1156
-
C:\Windows\Temp\LDjUlqbegEvwPzDv\decWFNdVWcTWzNJ\tylgiFD.exeC:\Windows\Temp\LDjUlqbegEvwPzDv\decWFNdVWcTWzNJ\tylgiFD.exe Mg /jDsite_idxke 525403 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "biLFSVxFnVnSpHlhoN"2⤵PID:2828
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4232
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:4012
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:3396
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\TvkkUqnZU\EvmHvS.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "IgXFFhGQnqYgGHX" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4216
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IgXFFhGQnqYgGHX2" /F /xml "C:\Program Files (x86)\TvkkUqnZU\FVOPZwK.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4828
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "IgXFFhGQnqYgGHX"2⤵PID:208
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "IgXFFhGQnqYgGHX"2⤵PID:3420
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "JzWsHQyKiSOqpl" /F /xml "C:\Program Files (x86)\jOQmpEGyMvtU2\NKkzRCV.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ItPLcCxfXvzpv2" /F /xml "C:\ProgramData\SiCNTTjMJAtvwHVB\TQADoyD.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4868
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NFJzelbnxaqfrDcFl2" /F /xml "C:\Program Files (x86)\BLexGiqdsuYvaXVnAcR\ETovNqw.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2012
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "umUFBBFZGoftQbMSEhA2" /F /xml "C:\Program Files (x86)\osWDoWbqnTFGC\qNutJTA.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4924
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RMddMXTgxvDdLvxMd" /SC once /ST 11:20:00 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\LDjUlqbegEvwPzDv\OOQimxpT\rYFAkMT.dll\",#1 /Zfsite_idcGg 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2512
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "RMddMXTgxvDdLvxMd"2⤵PID:1176
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:2056
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:1280
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:488
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jGHXcBuFeUKONdtKg"2⤵PID:4988
-
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\LDjUlqbegEvwPzDv\OOQimxpT\rYFAkMT.dll",#1 /Zfsite_idcGg 5254031⤵PID:2532
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\LDjUlqbegEvwPzDv\OOQimxpT\rYFAkMT.dll",#1 /Zfsite_idcGg 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
PID:5088 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "RMddMXTgxvDdLvxMd"3⤵PID:1256
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5da063f9bfcf47d3e1d0e87c4a7c78150
SHA1a107dc388e85e3647d223ae0c1589a3374f34d16
SHA256a6e1ac3ea56c1e3d561667fe4d67e830b3c53c88da829b51401d298b6dc3eee1
SHA5127c98691667a937563db133fbedc0afbfa2547f921431fae763afc9e5cd983aa1bd8068c7d3f4726a7fc6aaabe4dcd9162486bf2a76cb6bd5b6033f0502f62ccc
-
Filesize
2KB
MD514373aec718dd1117bdca78c34348233
SHA126a53bf98270cb9b69a8d2bba812e747e4fec09d
SHA25618ee89ed27022329cd06e090501d4c2dcd40e3715f6af11b6cc051fba7055f38
SHA51227521e9c08a96c27b28d7cafb34bac0bd1c12dcb5cecd8dc9cb5fdd7e71d3c6c4c73a18e16fc644092941b5cf6224d7f5eae2948915d8f8cd65fbb8f8c4728bf
-
Filesize
2KB
MD539d85f12857958ae49650eefea8f1589
SHA10ffa7e93f6f9c00c1f858cc767f6a5289524797d
SHA2560dcde23ce5c478c8dd0efc61ba63ad822cd8b768aed811526ceb3c73f4f22ad4
SHA5120dc76185b328878d1d85d949c8b891962f4f02a3cd64676bbd5f175495c9e4f6ede7701aec6b45bc8841b042e0e628a6c9d257c42e11e202f0c45bd30a364210
-
Filesize
2KB
MD56bb00bd57e06f4838e3deeaf6564f5ca
SHA1f56dcc648e73276a3705193a982d3f75180ba9ab
SHA256768c6fa4998b51a56f4e184d59b0de59c6aed6db93afab446e4b88c94a6297c8
SHA512eea8287ab0dffb98c464a1c5f25fce1e49aeae08f7637065040588b4aa75642aaa61dcdfc76dfc231fc7a25c05f6f5f0390792ef6f6090001652e4f1b2408baf
-
Filesize
1.4MB
MD5baaf7c9bf66f27a6514eff2b30618cec
SHA1f0d2a63b25ee4e7cf5fedb937908765aad7b480e
SHA256841907ad49b86bab25495996e96e4d66da7775d4f6bd207f4b08ed235aaa9758
SHA51217db368394f4782e65207a22cd40d85458bea78e30f2516761cef18d85c788b767a298aa503ff92e2a9decfad0a9386508780f85feae66d5ea235f51320a7b80
-
Filesize
2KB
MD598a5c810941bbebf521e171a4792397e
SHA1004f25bf6cc648ba57770e6c727eb5b499458b4b
SHA2564bb142c41d21906b9e6a676413d415bb756d96f8b170490eb8670f64efe8e09c
SHA512c9ce46476d595e6291441b10ca23d0c013390b310e5c6e956d17c05dd814b2e07ea26a62f681bed1283b327617a981840e3a41e949f3f199284ede0ae2eddb4f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD57d5ffcf59ffec8afb8d536ff51a9b2e8
SHA109212f54628e57fbfedcc732b154042ce87ccc98
SHA2561d785291b57f41d749642b851f913e63adf806c711a9e56a9329c211ceccb1d7
SHA51242d11d7f04e478182cdd1a423ba4bd0b2ff656f0f1360631dc6103c98c9b5023e2fdf0ebdb8466977c8e62bd704fbcf2e2ede44fed45d52e0984c5f91dbd6a8a
-
Filesize
28KB
MD55d95e3ee4e8b510cc4251f7715bd35a5
SHA18135f0c0a508da7af18aa4e70045360c59ccc697
SHA25672b04ee3670d98d9801301c1ee6b23608933b0917015371e7ef12e51c0cf1db4
SHA51232ffb93ce9fe0bdfb30a19694841210ac35a2f7d14c430260704b8aa88fe83ed68a6fef892cfbe7b05f6902da3c14df9e5bac104a5117caea45dad44c370ce5a
-
Filesize
3KB
MD5e9b877cbebdba6a332b76a063ac66a1f
SHA1062e17f825bdc8e12c5275b8245c8eac39a16649
SHA2561acc0827438e2d9c893bd886d1982cdb76c9b598b991c16a74289390d4535bcb
SHA512eac7e45742eb6d9b16538adb81f399b4298d9f0c5442bd47d58783920682046abe36c0c8a3f449230c67321eb62154ffe3f26b47bca5c8de3aa4099aa8fe4eb7
-
Filesize
1KB
MD5e0a0bc5c9dda13a4b2e142f20f4c9886
SHA17cc1bf5df9b5dae50ffdff39156783e6bf94ee39
SHA2561e8663fff22ff2284d415e1cdfcee06cce01ceda02c2bfc249f5e321626c845a
SHA51278c9784d41044a4544e47dd0e7479654fdcddbb5d2616a901b5cb166093619e838d570bb9d00f84de0efb73b55a3eb5adeced3e869f7c36b3168909e285c0315
-
Filesize
6.1MB
MD5332203e80d9f98192d2597d892c3c36d
SHA11d8361fbd4389ee662a78bb1714605227f2a2c6b
SHA256c75de26a526b4fc307e7a786f573e34d42e899268f27a49dd4400c9d1bcb5bf9
SHA51231176ffbf33a3c142e9b11097065018e0b52fa01564b4c2ffe99641e2e55e4132680c30cbd4a04f3acab70025c9399ccde2fbe01be792ab0ce4aea16710e68b2
-
Filesize
6.1MB
MD5332203e80d9f98192d2597d892c3c36d
SHA11d8361fbd4389ee662a78bb1714605227f2a2c6b
SHA256c75de26a526b4fc307e7a786f573e34d42e899268f27a49dd4400c9d1bcb5bf9
SHA51231176ffbf33a3c142e9b11097065018e0b52fa01564b4c2ffe99641e2e55e4132680c30cbd4a04f3acab70025c9399ccde2fbe01be792ab0ce4aea16710e68b2
-
Filesize
6.9MB
MD50daabcb2b71fcda9397384544edc9384
SHA1485bcbd73eaec585928c09659ccc1e32a2f1fd7a
SHA256f26893dfe14b52ef13ad52a954e32157fae458f8659e0715c3b60151aac92ddc
SHA5121cd318ec045d8f30c7d7a8abc068a7ca882a0dc0072e0e77c982a4473bc89156e1fe21c43161e98289b7e64a4e762087e92a89aafe8ce2e217983b228f0dd17c
-
Filesize
6.9MB
MD50daabcb2b71fcda9397384544edc9384
SHA1485bcbd73eaec585928c09659ccc1e32a2f1fd7a
SHA256f26893dfe14b52ef13ad52a954e32157fae458f8659e0715c3b60151aac92ddc
SHA5121cd318ec045d8f30c7d7a8abc068a7ca882a0dc0072e0e77c982a4473bc89156e1fe21c43161e98289b7e64a4e762087e92a89aafe8ce2e217983b228f0dd17c
-
Filesize
6.9MB
MD50daabcb2b71fcda9397384544edc9384
SHA1485bcbd73eaec585928c09659ccc1e32a2f1fd7a
SHA256f26893dfe14b52ef13ad52a954e32157fae458f8659e0715c3b60151aac92ddc
SHA5121cd318ec045d8f30c7d7a8abc068a7ca882a0dc0072e0e77c982a4473bc89156e1fe21c43161e98289b7e64a4e762087e92a89aafe8ce2e217983b228f0dd17c
-
Filesize
6.9MB
MD50daabcb2b71fcda9397384544edc9384
SHA1485bcbd73eaec585928c09659ccc1e32a2f1fd7a
SHA256f26893dfe14b52ef13ad52a954e32157fae458f8659e0715c3b60151aac92ddc
SHA5121cd318ec045d8f30c7d7a8abc068a7ca882a0dc0072e0e77c982a4473bc89156e1fe21c43161e98289b7e64a4e762087e92a89aafe8ce2e217983b228f0dd17c
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
7KB
MD5579fd8628141992249004a6406dd57aa
SHA19b300e34059b5c23efcde598e2d1cefb30279562
SHA2569b4ec404a14d774164ea6b88f003533e0ce222463c80803e04361939a40a67dd
SHA512a72acbb6a54b151d2f2abf30b3b1ed95acddc50351d8ce5aee3b01763bd38dda0e6c79553e47bd0bd309b1f0d6fdab17ebe79fe0b33c3d8943198fd32326f1b2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD50f5cbdca905beb13bebdcf43fb0716bd
SHA19e136131389fde83297267faf6c651d420671b3f
SHA256a99135d86804f5cf8aaeb5943c1929bd1458652a3318ab8c01aee22bb4991060
SHA512a41d2939473cffcb6beb8b58b499441d16da8bcc22972d53b8b699b82a7dc7be0db39bcd2486edd136294eb3f1c97ddd27b2a9ff45b831579cba6896d1f776b0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize12KB
MD5e172cc035fe611c359412ac5364ec593
SHA19a919087a4c0ddeacaff5c653270e7cf9b78b0e6
SHA256053493c4c80dfcea570dd2119761f0c6baa4d450f8c1f807b998e869beb22d22
SHA5124eb82d119be4e6ff13383e2554821a3c8c316baa18de1e256a1de7e936ea8fa5827eab783042bc4145a019f141c76a68f3c5fd3c5c9a335c083766a081c7012d
-
Filesize
6.1MB
MD59d31a2193c7fb87256dbc8889839145c
SHA1a1c7279622d0a8031f0f7e96bb29784a03fb05e0
SHA25628c606f62f9b726b63fa051ee875fd71e6ec1fc0d60adac0edb9ff1d8db16df2
SHA512f1027ff6a15745207f70dd0056af08ca72ec69d1d0776dfa149f03ba2469a6e4c6b1e8e502e84557324485c1a6744b5f7b0affeab8a5efd3960dec04a2c2256f
-
Filesize
6.9MB
MD50daabcb2b71fcda9397384544edc9384
SHA1485bcbd73eaec585928c09659ccc1e32a2f1fd7a
SHA256f26893dfe14b52ef13ad52a954e32157fae458f8659e0715c3b60151aac92ddc
SHA5121cd318ec045d8f30c7d7a8abc068a7ca882a0dc0072e0e77c982a4473bc89156e1fe21c43161e98289b7e64a4e762087e92a89aafe8ce2e217983b228f0dd17c
-
Filesize
6.9MB
MD50daabcb2b71fcda9397384544edc9384
SHA1485bcbd73eaec585928c09659ccc1e32a2f1fd7a
SHA256f26893dfe14b52ef13ad52a954e32157fae458f8659e0715c3b60151aac92ddc
SHA5121cd318ec045d8f30c7d7a8abc068a7ca882a0dc0072e0e77c982a4473bc89156e1fe21c43161e98289b7e64a4e762087e92a89aafe8ce2e217983b228f0dd17c
-
Filesize
6.9MB
MD50daabcb2b71fcda9397384544edc9384
SHA1485bcbd73eaec585928c09659ccc1e32a2f1fd7a
SHA256f26893dfe14b52ef13ad52a954e32157fae458f8659e0715c3b60151aac92ddc
SHA5121cd318ec045d8f30c7d7a8abc068a7ca882a0dc0072e0e77c982a4473bc89156e1fe21c43161e98289b7e64a4e762087e92a89aafe8ce2e217983b228f0dd17c
-
Filesize
5KB
MD50bd00fb8192b580c0917d5e6a83cae42
SHA174cdec052b6adf7d8b23835dcf13c097f4dfe014
SHA2567c8b01513c1c6fbf0d7a4ebd6a10f57c8221cf97cb56709721e087582b4395ff
SHA51289cd4c8223f60867c9f0f6d5601758737719e8a1e7c5fa8459f9cdb73618b14825c4991a09593918d4a3be73c37895947073f248fdb1ead7c7143ef0bcd06660
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.1MB
MD59d31a2193c7fb87256dbc8889839145c
SHA1a1c7279622d0a8031f0f7e96bb29784a03fb05e0
SHA25628c606f62f9b726b63fa051ee875fd71e6ec1fc0d60adac0edb9ff1d8db16df2
SHA512f1027ff6a15745207f70dd0056af08ca72ec69d1d0776dfa149f03ba2469a6e4c6b1e8e502e84557324485c1a6744b5f7b0affeab8a5efd3960dec04a2c2256f