Analysis
-
max time kernel
164s -
max time network
262s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11/07/2024, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff.exe
Resource
win7-20240704-en
General
-
Target
c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff.exe
-
Size
7.3MB
-
MD5
8e83a0d33c080fb12dd1e8b84dc2a5f9
-
SHA1
3ed612adc379f6e0529dcb8eef015ccd5da06faf
-
SHA256
c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff
-
SHA512
07fa4d2702491093c8efbfd52c9f4e795f31dcf7e4b87d98e21ebb90dbeddab7a9d494d5804e2c72fb280fa57da556d0ad9a718677cf15eae275758204714247
-
SSDEEP
196608:91OTVZAnLjvxhU/KExKDQcqmhOcdEVfLqmYR7+mw4uPbjl:3OTPCBh2KhQPMOcdc+mC7+mluPbjl
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 32 1264 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 1468 powershell.exe 2036 powershell.EXE 2984 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Control Panel\International\Geo\Nation aQXmSmu.exe -
Executes dropped EXE 4 IoCs
pid Process 3724 Install.exe 3672 Install.exe 596 Install.exe 4236 aQXmSmu.exe -
Loads dropped DLL 1 IoCs
pid Process 1264 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json aQXmSmu.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json aQXmSmu.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini Install.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_76B4AC942398240FF309817636D6DBC9 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA aQXmSmu.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_A3D4688236962EEA03574DE4F61B95D9 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_A3D4688236962EEA03574DE4F61B95D9 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_D55A76EA86A3695733B952639E5D4848 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E52E4DB9468EB31D663A0754C2775A04 aQXmSmu.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_D55A76EA86A3695733B952639E5D4848 aQXmSmu.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_76B4AC942398240FF309817636D6DBC9 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 aQXmSmu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E52E4DB9468EB31D663A0754C2775A04 aQXmSmu.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\rZPMEzngU\BUgfyBV.xml aQXmSmu.exe File created C:\Program Files (x86)\LAYqAmppRtojC\WMESfUA.dll aQXmSmu.exe File created C:\Program Files (x86)\LAYqAmppRtojC\NYROWNc.xml aQXmSmu.exe File created C:\Program Files (x86)\GtOnFDWCCgUn\VMGcNOD.dll aQXmSmu.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi aQXmSmu.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak aQXmSmu.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja aQXmSmu.exe File created C:\Program Files (x86)\rZPMEzngU\tTaYWd.dll aQXmSmu.exe File created C:\Program Files (x86)\itCXZnYssICbfHKCXDR\aNBzfpi.dll aQXmSmu.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi aQXmSmu.exe File created C:\Program Files (x86)\KDENuaOqQISU2\sbsxRcr.xml aQXmSmu.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak aQXmSmu.exe File created C:\Program Files (x86)\KDENuaOqQISU2\YtbTBaVYMWhdm.dll aQXmSmu.exe File created C:\Program Files (x86)\itCXZnYssICbfHKCXDR\UJCQutu.xml aQXmSmu.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bMfeDuSmKBAGoOfQBS.job schtasks.exe File created C:\Windows\Tasks\NEaCSBqXysBCPlvqA.job schtasks.exe File created C:\Windows\Tasks\ddAsdXfMPNFuAfl.job schtasks.exe File created C:\Windows\Tasks\EzpqHUsZzUnFxcQTT.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4964 596 WerFault.exe 84 1932 3672 WerFault.exe 74 1396 4236 WerFault.exe 154 -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" aQXmSmu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket aQXmSmu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ aQXmSmu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "7" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix aQXmSmu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3844 schtasks.exe 2140 schtasks.exe 204 schtasks.exe 2204 schtasks.exe 5100 schtasks.exe 348 schtasks.exe 1084 schtasks.exe 528 schtasks.exe 4976 schtasks.exe 3680 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 1468 powershell.exe 1468 powershell.exe 1468 powershell.exe 4672 powershell.exe 4672 powershell.exe 4672 powershell.exe 1932 powershell.exe 1932 powershell.exe 1932 powershell.exe 2036 powershell.EXE 2036 powershell.EXE 2036 powershell.EXE 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 2984 powershell.exe 2984 powershell.exe 2984 powershell.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe 4236 aQXmSmu.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1468 powershell.exe Token: SeIncreaseQuotaPrivilege 4256 WMIC.exe Token: SeSecurityPrivilege 4256 WMIC.exe Token: SeTakeOwnershipPrivilege 4256 WMIC.exe Token: SeLoadDriverPrivilege 4256 WMIC.exe Token: SeSystemProfilePrivilege 4256 WMIC.exe Token: SeSystemtimePrivilege 4256 WMIC.exe Token: SeProfSingleProcessPrivilege 4256 WMIC.exe Token: SeIncBasePriorityPrivilege 4256 WMIC.exe Token: SeCreatePagefilePrivilege 4256 WMIC.exe Token: SeBackupPrivilege 4256 WMIC.exe Token: SeRestorePrivilege 4256 WMIC.exe Token: SeShutdownPrivilege 4256 WMIC.exe Token: SeDebugPrivilege 4256 WMIC.exe Token: SeSystemEnvironmentPrivilege 4256 WMIC.exe Token: SeRemoteShutdownPrivilege 4256 WMIC.exe Token: SeUndockPrivilege 4256 WMIC.exe Token: SeManageVolumePrivilege 4256 WMIC.exe Token: 33 4256 WMIC.exe Token: 34 4256 WMIC.exe Token: 35 4256 WMIC.exe Token: 36 4256 WMIC.exe Token: SeIncreaseQuotaPrivilege 4256 WMIC.exe Token: SeSecurityPrivilege 4256 WMIC.exe Token: SeTakeOwnershipPrivilege 4256 WMIC.exe Token: SeLoadDriverPrivilege 4256 WMIC.exe Token: SeSystemProfilePrivilege 4256 WMIC.exe Token: SeSystemtimePrivilege 4256 WMIC.exe Token: SeProfSingleProcessPrivilege 4256 WMIC.exe Token: SeIncBasePriorityPrivilege 4256 WMIC.exe Token: SeCreatePagefilePrivilege 4256 WMIC.exe Token: SeBackupPrivilege 4256 WMIC.exe Token: SeRestorePrivilege 4256 WMIC.exe Token: SeShutdownPrivilege 4256 WMIC.exe Token: SeDebugPrivilege 4256 WMIC.exe Token: SeSystemEnvironmentPrivilege 4256 WMIC.exe Token: SeRemoteShutdownPrivilege 4256 WMIC.exe Token: SeUndockPrivilege 4256 WMIC.exe Token: SeManageVolumePrivilege 4256 WMIC.exe Token: 33 4256 WMIC.exe Token: 34 4256 WMIC.exe Token: 35 4256 WMIC.exe Token: 36 4256 WMIC.exe Token: SeDebugPrivilege 4672 powershell.exe Token: SeDebugPrivilege 1932 powershell.exe Token: SeDebugPrivilege 2036 powershell.EXE Token: SeDebugPrivilege 2984 powershell.exe Token: SeAssignPrimaryTokenPrivilege 4696 WMIC.exe Token: SeIncreaseQuotaPrivilege 4696 WMIC.exe Token: SeSecurityPrivilege 4696 WMIC.exe Token: SeTakeOwnershipPrivilege 4696 WMIC.exe Token: SeLoadDriverPrivilege 4696 WMIC.exe Token: SeSystemtimePrivilege 4696 WMIC.exe Token: SeBackupPrivilege 4696 WMIC.exe Token: SeRestorePrivilege 4696 WMIC.exe Token: SeShutdownPrivilege 4696 WMIC.exe Token: SeSystemEnvironmentPrivilege 4696 WMIC.exe Token: SeUndockPrivilege 4696 WMIC.exe Token: SeManageVolumePrivilege 4696 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 4696 WMIC.exe Token: SeIncreaseQuotaPrivilege 4696 WMIC.exe Token: SeSecurityPrivilege 4696 WMIC.exe Token: SeTakeOwnershipPrivilege 4696 WMIC.exe Token: SeLoadDriverPrivilege 4696 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 3724 3300 c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff.exe 73 PID 3300 wrote to memory of 3724 3300 c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff.exe 73 PID 3300 wrote to memory of 3724 3300 c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff.exe 73 PID 3724 wrote to memory of 3672 3724 Install.exe 74 PID 3724 wrote to memory of 3672 3724 Install.exe 74 PID 3724 wrote to memory of 3672 3724 Install.exe 74 PID 3672 wrote to memory of 3980 3672 Install.exe 76 PID 3672 wrote to memory of 3980 3672 Install.exe 76 PID 3672 wrote to memory of 3980 3672 Install.exe 76 PID 3980 wrote to memory of 780 3980 forfiles.exe 78 PID 3980 wrote to memory of 780 3980 forfiles.exe 78 PID 3980 wrote to memory of 780 3980 forfiles.exe 78 PID 780 wrote to memory of 1468 780 cmd.exe 79 PID 780 wrote to memory of 1468 780 cmd.exe 79 PID 780 wrote to memory of 1468 780 cmd.exe 79 PID 1468 wrote to memory of 4256 1468 powershell.exe 80 PID 1468 wrote to memory of 4256 1468 powershell.exe 80 PID 1468 wrote to memory of 4256 1468 powershell.exe 80 PID 3672 wrote to memory of 5100 3672 Install.exe 82 PID 3672 wrote to memory of 5100 3672 Install.exe 82 PID 3672 wrote to memory of 5100 3672 Install.exe 82 PID 596 wrote to memory of 4672 596 Install.exe 85 PID 596 wrote to memory of 4672 596 Install.exe 85 PID 596 wrote to memory of 4672 596 Install.exe 85 PID 4672 wrote to memory of 2320 4672 powershell.exe 87 PID 4672 wrote to memory of 2320 4672 powershell.exe 87 PID 4672 wrote to memory of 2320 4672 powershell.exe 87 PID 2320 wrote to memory of 1588 2320 cmd.exe 88 PID 2320 wrote to memory of 1588 2320 cmd.exe 88 PID 2320 wrote to memory of 1588 2320 cmd.exe 88 PID 4672 wrote to memory of 3948 4672 powershell.exe 89 PID 4672 wrote to memory of 3948 4672 powershell.exe 89 PID 4672 wrote to memory of 3948 4672 powershell.exe 89 PID 4672 wrote to memory of 4000 4672 powershell.exe 90 PID 4672 wrote to memory of 4000 4672 powershell.exe 90 PID 4672 wrote to memory of 4000 4672 powershell.exe 90 PID 4672 wrote to memory of 2728 4672 powershell.exe 91 PID 4672 wrote to memory of 2728 4672 powershell.exe 91 PID 4672 wrote to memory of 2728 4672 powershell.exe 91 PID 4672 wrote to memory of 3432 4672 powershell.exe 92 PID 4672 wrote to memory of 3432 4672 powershell.exe 92 PID 4672 wrote to memory of 3432 4672 powershell.exe 92 PID 4672 wrote to memory of 1384 4672 powershell.exe 93 PID 4672 wrote to memory of 1384 4672 powershell.exe 93 PID 4672 wrote to memory of 1384 4672 powershell.exe 93 PID 4672 wrote to memory of 4040 4672 powershell.exe 94 PID 4672 wrote to memory of 4040 4672 powershell.exe 94 PID 4672 wrote to memory of 4040 4672 powershell.exe 94 PID 4672 wrote to memory of 2856 4672 powershell.exe 95 PID 4672 wrote to memory of 2856 4672 powershell.exe 95 PID 4672 wrote to memory of 2856 4672 powershell.exe 95 PID 4672 wrote to memory of 3548 4672 powershell.exe 96 PID 4672 wrote to memory of 3548 4672 powershell.exe 96 PID 4672 wrote to memory of 3548 4672 powershell.exe 96 PID 4672 wrote to memory of 2964 4672 powershell.exe 97 PID 4672 wrote to memory of 2964 4672 powershell.exe 97 PID 4672 wrote to memory of 2964 4672 powershell.exe 97 PID 4672 wrote to memory of 4364 4672 powershell.exe 98 PID 4672 wrote to memory of 4364 4672 powershell.exe 98 PID 4672 wrote to memory of 4364 4672 powershell.exe 98 PID 4672 wrote to memory of 2188 4672 powershell.exe 99 PID 4672 wrote to memory of 2188 4672 powershell.exe 99 PID 4672 wrote to memory of 2188 4672 powershell.exe 99 PID 4672 wrote to memory of 4604 4672 powershell.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff.exe"C:\Users\Admin\AppData\Local\Temp\c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\7zS6716.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\7zS6968.tmp\Install.exe.\Install.exe /bRdOdidrvWct "525403" /S3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"4⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True5⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bMfeDuSmKBAGoOfQBS" /SC once /ST 22:41:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS6968.tmp\Install.exe\" NI /gCvdidhVdk 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 10204⤵
- Program crash
PID:1932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS6968.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zS6968.tmp\Install.exe NI /gCvdidhVdk 525403 /S1⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:1588
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:3948
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:2728
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:3432
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:1384
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:2856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:3548
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:2964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4364
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:2188
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4604
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:1376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:2896
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3204
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:5084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:4972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:2972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:4260
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GtOnFDWCCgUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GtOnFDWCCgUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KDENuaOqQISU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KDENuaOqQISU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LAYqAmppRtojC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LAYqAmppRtojC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\itCXZnYssICbfHKCXDR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\itCXZnYssICbfHKCXDR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rZPMEzngU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rZPMEzngU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\XKbpoCnULTQzsVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\XKbpoCnULTQzsVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\WIjQsZOhtuiKSoXd\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\WIjQsZOhtuiKSoXd\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GtOnFDWCCgUn" /t REG_DWORD /d 0 /reg:323⤵PID:4628
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GtOnFDWCCgUn" /t REG_DWORD /d 0 /reg:324⤵PID:352
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GtOnFDWCCgUn" /t REG_DWORD /d 0 /reg:643⤵PID:924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KDENuaOqQISU2" /t REG_DWORD /d 0 /reg:323⤵PID:5044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KDENuaOqQISU2" /t REG_DWORD /d 0 /reg:643⤵PID:380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LAYqAmppRtojC" /t REG_DWORD /d 0 /reg:323⤵PID:204
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LAYqAmppRtojC" /t REG_DWORD /d 0 /reg:643⤵PID:3536
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\itCXZnYssICbfHKCXDR" /t REG_DWORD /d 0 /reg:323⤵PID:4460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\itCXZnYssICbfHKCXDR" /t REG_DWORD /d 0 /reg:643⤵PID:1264
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rZPMEzngU" /t REG_DWORD /d 0 /reg:323⤵PID:4976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rZPMEzngU" /t REG_DWORD /d 0 /reg:643⤵PID:3740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\XKbpoCnULTQzsVVB /t REG_DWORD /d 0 /reg:323⤵PID:4932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\XKbpoCnULTQzsVVB /t REG_DWORD /d 0 /reg:643⤵PID:1996
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:1604
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:3600
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb /t REG_DWORD /d 0 /reg:323⤵PID:4172
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb /t REG_DWORD /d 0 /reg:643⤵PID:5116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\WIjQsZOhtuiKSoXd /t REG_DWORD /d 0 /reg:323⤵PID:3792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\WIjQsZOhtuiKSoXd /t REG_DWORD /d 0 /reg:643⤵PID:2836
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gOrArcptM" /SC once /ST 16:21:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Scheduled Task/Job: Scheduled Task
PID:3844
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gOrArcptM"2⤵PID:1388
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gOrArcptM"2⤵PID:4608
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NEaCSBqXysBCPlvqA" /SC once /ST 16:37:11 /RU "SYSTEM" /TR "\"C:\Windows\Temp\WIjQsZOhtuiKSoXd\QBJFAnahrWxXzYu\aQXmSmu.exe\" d4 /Jhgydidxt 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:348
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "NEaCSBqXysBCPlvqA"2⤵PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 596 -s 7162⤵
- Program crash
PID:4964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2060
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:1588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4208
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3608
-
C:\Windows\Temp\WIjQsZOhtuiKSoXd\QBJFAnahrWxXzYu\aQXmSmu.exeC:\Windows\Temp\WIjQsZOhtuiKSoXd\QBJFAnahrWxXzYu\aQXmSmu.exe d4 /Jhgydidxt 525403 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4236 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bMfeDuSmKBAGoOfQBS"2⤵PID:4224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:2364
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:3556
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:4344
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\rZPMEzngU\tTaYWd.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ddAsdXfMPNFuAfl" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:2140
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ddAsdXfMPNFuAfl2" /F /xml "C:\Program Files (x86)\rZPMEzngU\BUgfyBV.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ddAsdXfMPNFuAfl"2⤵PID:2388
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ddAsdXfMPNFuAfl"2⤵PID:656
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kOGKgYpsUQIYrn" /F /xml "C:\Program Files (x86)\KDENuaOqQISU2\sbsxRcr.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YbcvEstkhVXck2" /F /xml "C:\ProgramData\XKbpoCnULTQzsVVB\LDBDCab.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:204
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "eLfFCqzmhHqfRsiNs2" /F /xml "C:\Program Files (x86)\itCXZnYssICbfHKCXDR\UJCQutu.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4976
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "AkaVbrYIdJsqguUJkZJ2" /F /xml "C:\Program Files (x86)\LAYqAmppRtojC\NYROWNc.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2204
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EzpqHUsZzUnFxcQTT" /SC once /ST 10:55:48 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\WIjQsZOhtuiKSoXd\vGBxhTSl\eQyKIgD.dll\",#1 /wYxdidBf 525403" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:3680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "EzpqHUsZzUnFxcQTT"2⤵PID:224
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "NEaCSBqXysBCPlvqA"2⤵PID:2440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 17402⤵
- Program crash
PID:1396
-
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\WIjQsZOhtuiKSoXd\vGBxhTSl\eQyKIgD.dll",#1 /wYxdidBf 5254031⤵PID:2736
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\WIjQsZOhtuiKSoXd\vGBxhTSl\eQyKIgD.dll",#1 /wYxdidBf 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1264 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "EzpqHUsZzUnFxcQTT"3⤵PID:1316
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
2KB
MD50ce57e08604844a960124b92ba4a17ee
SHA1d455ae493f2efa53b4affe411bfcb6e32341ea37
SHA2561acd1aa722611e66f6324cf8c2b526e58c969b47f29f8120fe0c23613420f099
SHA51256bd3ca7fd51a95d7203cc071ed35761f64cd223ca3e019b5cf378eb8e1729ef9c56a9d96dde02dc9c3070242a58d355a3eea8adfe3e4ccad81faa9c319fb52e
-
Filesize
2KB
MD583ac6a85f37465349a6f8d3694217540
SHA1afd50b638919103db841ab7d97f172420ffa99b8
SHA25680bcd2c20db6a42ddd50e7470b85fd3f9449784629f1ac066609e5bdf35a9ce9
SHA512dc7b3f4e6b7838bc81cacee37aa91683d8af1cfa8b4be48fba55d9a4a46af6f6da9a58ca64833219f0f0907dae4a73d82d737ab6622efe5f9b75cac55a05f143
-
Filesize
2KB
MD5e1f46b65a52418705dcb7a32f3878f0f
SHA1ede4b2a6bfdfe43f66bd4da9795d076582227971
SHA256537aa6eab7248598dda941e174cc230dda4a3f3d55df3d98bb9528eecd95a3bc
SHA512bc119c5350e3dd4ac96f14f37d96f131b0095bf7147a6589341445a8a482afc25caa5b4264f1a68d01dfb1a075bd7ae56228396553d12bea5d8d4ff36798cac9
-
Filesize
2KB
MD568effd7eb15eecc32695f9ca9b317184
SHA1be74e4b3b39b08813ceaddaa23ee9b1de95a3886
SHA2560f98e2e0022b06d3398189398ba3a85f0a3c61caabea99f1cb47c10e33ef06b7
SHA512ab2db776cc8d41c41f75861a041511ef3dcde01183d401744b572f34f3da5552eb933495a33eac72a4f78f1c5b377e8c8cc93137e838f330d7fde8c01f993299
-
Filesize
2.0MB
MD52cfe82a458f832f0f41703394d4697db
SHA1f2dbb14d21c0814d1c7d85625406222decfc4936
SHA25602441a7ccd573da0425bc6a7dbf302317af1d24801ec7cf962cb868a38da2978
SHA5121e883defae164bb60a5e0637dd4deaa67d24aee23bc25fc3827661f06704166bd2e9830004ace973a4643f0f80ffd00a0151471c5f835be8e563e70e72287a84
-
Filesize
2KB
MD5d9f1c8185c02535cbdf62131ec2a8f6d
SHA13c96a6e1cb236b3104920e984824db8928089901
SHA256428acc233262a3884e94a69f4fda2b1f89e3117dc16d7e3f1e913b13e5016cd6
SHA512bab9fde5001e1b3ec7514e9fd6dfded0f8f4c659f3644664819d090d3b7ccff5eb6da05b509a462dafd54745fa5f6bf4d2b401a048637be8134f1e582852c6cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD59b1636ffae00ded47bdebe7e21cd9507
SHA1c8fd3b47ebeeb7a101890230e11c9e009dc59b5c
SHA256c30c1fbe5371ea4043336048a95e68e40fa5fc8ba9b6152054eed1ca907c0b28
SHA5120f27aefeca2aa881b5e501f591de816dc58ddb2eec26fc1561fd7f1a383d68ceb2ab2249e28957f6468df8b2db2fac719d877434fbe5e6799e7de2bf3bfc4fff
-
Filesize
12KB
MD57c3ae7e34474c0590e66e04758db310c
SHA19aa79a169ac40555633e30f43b5ae82a288a69d4
SHA256f30a5d88f74ed222105707b88048452a4cfe5d3eee163bfc99877a9d669d6e2f
SHA51278fa409fc015c7e44bcfa9a3a6b4b6f25c589be66449fa625423d5349515b9d312c5403163d74ba8d38ac310ec35f3679ddc478a3c1355791eba76c9b6aadc2d
-
Filesize
6.4MB
MD58414325a5eea51d28e8e6cd8115c0b27
SHA1a11cf007902fe5f76503fecc4aeac1304cc3c14b
SHA256f44e0cf414c78f625ea406fb34e4a3d78785087e5bd3eb65b456aa431b2d3353
SHA512571bc0f6fbe83d17ae372a5d6a88b8b6067daa3cfb39aecae2b43ea9560706cdceec02e0de5e1117bad19ae68b2efd4a6c939e0d87e7e6796b7dc7654894335c
-
Filesize
6.8MB
MD5b88154b4bba28d4a5a77de4288caa914
SHA16366388e441b5d19ce76492591d3578997b03c47
SHA2563435db8868cf3796ce484cd26c0dd26597d6d660eaa9437cc6e4403591140415
SHA512842929702e20d77776affcb12158b3226a09e114f3cffde04539f4521ff99cccbe2abd6710535a115c11cc570677b9ec1668cff1bef94aa447151e63bbf8a84c
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
6KB
MD5965bb6f255cd4ba57131e6ab29a674c1
SHA1a0c71a53535525c81d26a410dfe599f02baa49db
SHA256609d8d5b76d76e0895f45726f4e338be23ba962309b6df6d92c421ffb3388f9f
SHA512ec5f74a69fd17f3facc8d7ebc336823b04320e74e4875ca2ab5506fe7687974101b1e9a2b70ccae724626e7a435d013cfa35ebeb41bb0cbcb91241686e71ef67
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD5e33ed3d4cc9b2e5a08ae25747ef47620
SHA1e2f4cfdd39bcb2eb1c05648a37a3d8536eaf19b7
SHA2560e7093450fb6bb5201b4291033daf6099881421ab47b122972e0249ef5b45a4f
SHA5129e990f7ca202c7ecc7a21dd2433055b71bd62f2e524f4702b674316effeb8fa37e891d40f3e6a960380dd7967033c7a7f235e73a3c434e97495e532309b4f95e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize12KB
MD592d1a52cd692c9f2cbc6c4cdfee858a2
SHA163b27da95e5e6f2ab176213d57eb8e63c7264d3d
SHA256e7415ed6fb6ec11c182124c640ca8edff19fa5c909690ba9a2f7a8d58521fc39
SHA512b29476f458a0604dccc16a3cefae14af7a6f5efdac035cf7d1f6f5cd6bffde69cfc795c47c8b98879be9bafb8bd048648c2eb6c45aca59fccc8860e986aeb155
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize12KB
MD5982a38a6b71b44a12e0c100d01b2ffbe
SHA1d7a191790f18d872dd37cad706cf871dec0e6745
SHA25619062bec1edeaeed119f2c8224a87a4fc3d37f4fe481ec85569429098d995a5d
SHA5123ce958aab45e90d7ab069e0f15b6e6ee56f22afc3ab147b3badce45351db109f0d74d2aabb655487384016ccb2c274b2415471db6e25e13e4827fc830f79f6c1
-
Filesize
6.5MB
MD505d74d648db89507c0fe7fdb07eb7689
SHA1439e5ef79421caa80484d685fe12065c3d1791c0
SHA25624ed53d40ae08bd817fec287f1355e3ebbcbb06dec4af9ca995c745f37441318
SHA512561e8607cb4fecaf57c74b7cf815ae9ee3558893db39d41051902a2625039803f4ccbd2f5fd9d91a86557b148ec667fee08b239b1eb609f6080b796a08f88413
-
Filesize
6KB
MD5a22009124c8cd8b5f42306fb8701285f
SHA166104107bde2388a5cc8bc3771d23e2dedf91a82
SHA256ea0a2fb02e161dd50ccd53774e5c5e75180e048203c359050309517ec827b423
SHA512d819b78edaa01f5509c67b3b0bd8212b2f2ccc2fbdf986656eadcab55673f18ecb869461c5f52209db5d69b83c6caee788a575b2352b3ec20d9dc790eb1d3f40