Analysis
-
max time kernel
199s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22/07/2024, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
53ed5d70f608d6131aacfff3db008dbd4830d0d7c4ee7aa991a34ca76a590488.exe
Resource
win7-20240704-en
General
-
Target
53ed5d70f608d6131aacfff3db008dbd4830d0d7c4ee7aa991a34ca76a590488.exe
-
Size
7.3MB
-
MD5
1fe10cac38d3f9948397f1b38dfe5cc3
-
SHA1
684b5bf60b7b13a245c4942aa268114a3219746f
-
SHA256
53ed5d70f608d6131aacfff3db008dbd4830d0d7c4ee7aa991a34ca76a590488
-
SHA512
98fbbdb7779ba127bca7081cd06c1393cf19835294047dda61c964ea5f73ac8bdceedc6a250564a7d889f1059029124cacd3b38c46462cf125e7fb7ce3a0c649
-
SSDEEP
196608:91Oy4Z6V/TrJMr1XDbeBNbNS0cWS9+Czh3pZTlYaYIg2uVQjaR:3OJMVi1X3oNSKSwCtpZTlYVbTmaR
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 42 4416 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 1936 powershell.EXE 3116 powershell.exe 4620 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Control Panel\International\Geo\Nation EOyfjeO.exe -
Executes dropped EXE 4 IoCs
pid Process 2668 Install.exe 1016 Install.exe 4284 Install.exe 4412 EOyfjeO.exe -
Loads dropped DLL 1 IoCs
pid Process 4416 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json EOyfjeO.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json EOyfjeO.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini Install.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_DE59F8C40B88A0DF57DC57DBBEDD7057 EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_32201FF65E9A20A693462A3946A29CAE EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\54E176903A096E58E807B60E1BDFA85C EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_32201FF65E9A20A693462A3946A29CAE EOyfjeO.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_A71D3C9ACFD0888B19B4EAA86FAA4437 EOyfjeO.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol Install.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199 EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199 EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_A71D3C9ACFD0888B19B4EAA86FAA4437 EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\54E176903A096E58E807B60E1BDFA85C EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_DE59F8C40B88A0DF57DC57DBBEDD7057 EOyfjeO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat EOyfjeO.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak EOyfjeO.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja EOyfjeO.exe File created C:\Program Files (x86)\RFxCBGtTODaU2\kxfwXyDKYHijl.dll EOyfjeO.exe File created C:\Program Files (x86)\GLXYdpiECluCPYQiXJR\jlvRkEU.dll EOyfjeO.exe File created C:\Program Files (x86)\BAJdVDKENAtrC\ANwNVNE.dll EOyfjeO.exe File created C:\Program Files (x86)\RFxCBGtTODaU2\HpntRKF.xml EOyfjeO.exe File created C:\Program Files (x86)\BAJdVDKENAtrC\IyyPgVx.xml EOyfjeO.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi EOyfjeO.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi EOyfjeO.exe File created C:\Program Files (x86)\FhsMTvRiU\TvhGqwN.xml EOyfjeO.exe File created C:\Program Files (x86)\GLXYdpiECluCPYQiXJR\kbLPgDi.xml EOyfjeO.exe File created C:\Program Files (x86)\FhsMTvRiU\xwyKHj.dll EOyfjeO.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak EOyfjeO.exe File created C:\Program Files (x86)\iFIQBiuMTZUn\siWvnbO.dll EOyfjeO.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bhUbGthiAMRPkmWnMY.job schtasks.exe File created C:\Windows\Tasks\FeXuZZpzPKWOhLEOt.job schtasks.exe File created C:\Windows\Tasks\KxUrKUaAkxiIWMn.job schtasks.exe File created C:\Windows\Tasks\wSubePrCNeRTDDIwm.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 912 4284 WerFault.exe 83 2200 1016 WerFault.exe 73 5032 4412 WerFault.exe 153 -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "1" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" EOyfjeO.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" EOyfjeO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ EOyfjeO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{38fc5f00-0000-0000-0000-d01200000000}\NukeOnDelete = "0" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket EOyfjeO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{38fc5f00-0000-0000-0000-d01200000000} Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing EOyfjeO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1200 schtasks.exe 4520 schtasks.exe 4216 schtasks.exe 704 schtasks.exe 4384 schtasks.exe 3404 schtasks.exe 4360 schtasks.exe 4332 schtasks.exe 3196 schtasks.exe 4092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 4620 powershell.exe 4620 powershell.exe 4620 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 764 powershell.exe 764 powershell.exe 764 powershell.exe 1936 powershell.EXE 1936 powershell.EXE 1936 powershell.EXE 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 3116 powershell.exe 3116 powershell.exe 3116 powershell.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe 4412 EOyfjeO.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4620 powershell.exe Token: SeIncreaseQuotaPrivilege 4532 WMIC.exe Token: SeSecurityPrivilege 4532 WMIC.exe Token: SeTakeOwnershipPrivilege 4532 WMIC.exe Token: SeLoadDriverPrivilege 4532 WMIC.exe Token: SeSystemProfilePrivilege 4532 WMIC.exe Token: SeSystemtimePrivilege 4532 WMIC.exe Token: SeProfSingleProcessPrivilege 4532 WMIC.exe Token: SeIncBasePriorityPrivilege 4532 WMIC.exe Token: SeCreatePagefilePrivilege 4532 WMIC.exe Token: SeBackupPrivilege 4532 WMIC.exe Token: SeRestorePrivilege 4532 WMIC.exe Token: SeShutdownPrivilege 4532 WMIC.exe Token: SeDebugPrivilege 4532 WMIC.exe Token: SeSystemEnvironmentPrivilege 4532 WMIC.exe Token: SeRemoteShutdownPrivilege 4532 WMIC.exe Token: SeUndockPrivilege 4532 WMIC.exe Token: SeManageVolumePrivilege 4532 WMIC.exe Token: 33 4532 WMIC.exe Token: 34 4532 WMIC.exe Token: 35 4532 WMIC.exe Token: 36 4532 WMIC.exe Token: SeIncreaseQuotaPrivilege 4532 WMIC.exe Token: SeSecurityPrivilege 4532 WMIC.exe Token: SeTakeOwnershipPrivilege 4532 WMIC.exe Token: SeLoadDriverPrivilege 4532 WMIC.exe Token: SeSystemProfilePrivilege 4532 WMIC.exe Token: SeSystemtimePrivilege 4532 WMIC.exe Token: SeProfSingleProcessPrivilege 4532 WMIC.exe Token: SeIncBasePriorityPrivilege 4532 WMIC.exe Token: SeCreatePagefilePrivilege 4532 WMIC.exe Token: SeBackupPrivilege 4532 WMIC.exe Token: SeRestorePrivilege 4532 WMIC.exe Token: SeShutdownPrivilege 4532 WMIC.exe Token: SeDebugPrivilege 4532 WMIC.exe Token: SeSystemEnvironmentPrivilege 4532 WMIC.exe Token: SeRemoteShutdownPrivilege 4532 WMIC.exe Token: SeUndockPrivilege 4532 WMIC.exe Token: SeManageVolumePrivilege 4532 WMIC.exe Token: 33 4532 WMIC.exe Token: 34 4532 WMIC.exe Token: 35 4532 WMIC.exe Token: 36 4532 WMIC.exe Token: SeDebugPrivilege 4560 powershell.exe Token: SeDebugPrivilege 764 powershell.exe Token: SeDebugPrivilege 1936 powershell.EXE Token: SeDebugPrivilege 3116 powershell.exe Token: SeAssignPrimaryTokenPrivilege 4028 WMIC.exe Token: SeIncreaseQuotaPrivilege 4028 WMIC.exe Token: SeSecurityPrivilege 4028 WMIC.exe Token: SeTakeOwnershipPrivilege 4028 WMIC.exe Token: SeLoadDriverPrivilege 4028 WMIC.exe Token: SeSystemtimePrivilege 4028 WMIC.exe Token: SeBackupPrivilege 4028 WMIC.exe Token: SeRestorePrivilege 4028 WMIC.exe Token: SeShutdownPrivilege 4028 WMIC.exe Token: SeSystemEnvironmentPrivilege 4028 WMIC.exe Token: SeUndockPrivilege 4028 WMIC.exe Token: SeManageVolumePrivilege 4028 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 4028 WMIC.exe Token: SeIncreaseQuotaPrivilege 4028 WMIC.exe Token: SeSecurityPrivilege 4028 WMIC.exe Token: SeTakeOwnershipPrivilege 4028 WMIC.exe Token: SeLoadDriverPrivilege 4028 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 588 wrote to memory of 2668 588 53ed5d70f608d6131aacfff3db008dbd4830d0d7c4ee7aa991a34ca76a590488.exe 72 PID 588 wrote to memory of 2668 588 53ed5d70f608d6131aacfff3db008dbd4830d0d7c4ee7aa991a34ca76a590488.exe 72 PID 588 wrote to memory of 2668 588 53ed5d70f608d6131aacfff3db008dbd4830d0d7c4ee7aa991a34ca76a590488.exe 72 PID 2668 wrote to memory of 1016 2668 Install.exe 73 PID 2668 wrote to memory of 1016 2668 Install.exe 73 PID 2668 wrote to memory of 1016 2668 Install.exe 73 PID 1016 wrote to memory of 1148 1016 Install.exe 75 PID 1016 wrote to memory of 1148 1016 Install.exe 75 PID 1016 wrote to memory of 1148 1016 Install.exe 75 PID 1148 wrote to memory of 4584 1148 forfiles.exe 77 PID 1148 wrote to memory of 4584 1148 forfiles.exe 77 PID 1148 wrote to memory of 4584 1148 forfiles.exe 77 PID 4584 wrote to memory of 4620 4584 cmd.exe 78 PID 4584 wrote to memory of 4620 4584 cmd.exe 78 PID 4584 wrote to memory of 4620 4584 cmd.exe 78 PID 4620 wrote to memory of 4532 4620 powershell.exe 79 PID 4620 wrote to memory of 4532 4620 powershell.exe 79 PID 4620 wrote to memory of 4532 4620 powershell.exe 79 PID 1016 wrote to memory of 4384 1016 Install.exe 81 PID 1016 wrote to memory of 4384 1016 Install.exe 81 PID 1016 wrote to memory of 4384 1016 Install.exe 81 PID 4284 wrote to memory of 4560 4284 Install.exe 84 PID 4284 wrote to memory of 4560 4284 Install.exe 84 PID 4284 wrote to memory of 4560 4284 Install.exe 84 PID 4560 wrote to memory of 3396 4560 powershell.exe 86 PID 4560 wrote to memory of 3396 4560 powershell.exe 86 PID 4560 wrote to memory of 3396 4560 powershell.exe 86 PID 3396 wrote to memory of 1664 3396 cmd.exe 87 PID 3396 wrote to memory of 1664 3396 cmd.exe 87 PID 3396 wrote to memory of 1664 3396 cmd.exe 87 PID 4560 wrote to memory of 4348 4560 powershell.exe 88 PID 4560 wrote to memory of 4348 4560 powershell.exe 88 PID 4560 wrote to memory of 4348 4560 powershell.exe 88 PID 4560 wrote to memory of 3252 4560 powershell.exe 89 PID 4560 wrote to memory of 3252 4560 powershell.exe 89 PID 4560 wrote to memory of 3252 4560 powershell.exe 89 PID 4560 wrote to memory of 4824 4560 powershell.exe 90 PID 4560 wrote to memory of 4824 4560 powershell.exe 90 PID 4560 wrote to memory of 4824 4560 powershell.exe 90 PID 4560 wrote to memory of 592 4560 powershell.exe 91 PID 4560 wrote to memory of 592 4560 powershell.exe 91 PID 4560 wrote to memory of 592 4560 powershell.exe 91 PID 4560 wrote to memory of 3160 4560 powershell.exe 92 PID 4560 wrote to memory of 3160 4560 powershell.exe 92 PID 4560 wrote to memory of 3160 4560 powershell.exe 92 PID 4560 wrote to memory of 2364 4560 powershell.exe 93 PID 4560 wrote to memory of 2364 4560 powershell.exe 93 PID 4560 wrote to memory of 2364 4560 powershell.exe 93 PID 4560 wrote to memory of 4120 4560 powershell.exe 94 PID 4560 wrote to memory of 4120 4560 powershell.exe 94 PID 4560 wrote to memory of 4120 4560 powershell.exe 94 PID 4560 wrote to memory of 4680 4560 powershell.exe 95 PID 4560 wrote to memory of 4680 4560 powershell.exe 95 PID 4560 wrote to memory of 4680 4560 powershell.exe 95 PID 4560 wrote to memory of 3920 4560 powershell.exe 96 PID 4560 wrote to memory of 3920 4560 powershell.exe 96 PID 4560 wrote to memory of 3920 4560 powershell.exe 96 PID 4560 wrote to memory of 2216 4560 powershell.exe 97 PID 4560 wrote to memory of 2216 4560 powershell.exe 97 PID 4560 wrote to memory of 2216 4560 powershell.exe 97 PID 4560 wrote to memory of 4256 4560 powershell.exe 98 PID 4560 wrote to memory of 4256 4560 powershell.exe 98 PID 4560 wrote to memory of 4256 4560 powershell.exe 98 PID 4560 wrote to memory of 1784 4560 powershell.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\53ed5d70f608d6131aacfff3db008dbd4830d0d7c4ee7aa991a34ca76a590488.exe"C:\Users\Admin\AppData\Local\Temp\53ed5d70f608d6131aacfff3db008dbd4830d0d7c4ee7aa991a34ca76a590488.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\7zS6B2D.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\7zS6DAE.tmp\Install.exe.\Install.exe /Hdidx "525403" /S3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"4⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True5⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bhUbGthiAMRPkmWnMY" /SC once /ST 05:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS6DAE.tmp\Install.exe\" yE /qdidrLQJ 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 7724⤵
- Program crash
PID:2200
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS6DAE.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zS6DAE.tmp\Install.exe yE /qdidrLQJ 525403 /S1⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:1664
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:3252
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4824
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:3160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:2364
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4120
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:3920
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:2216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:1784
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:1288
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:3152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:3764
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2184
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:3768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:2900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:3064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:4724
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:2784
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BAJdVDKENAtrC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BAJdVDKENAtrC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FhsMTvRiU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FhsMTvRiU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GLXYdpiECluCPYQiXJR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GLXYdpiECluCPYQiXJR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RFxCBGtTODaU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RFxCBGtTODaU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iFIQBiuMTZUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iFIQBiuMTZUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\DVkSBBtutEOgdaVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\DVkSBBtutEOgdaVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\vBQZIWFuokkDzStmV\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\vBQZIWFuokkDzStmV\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\GWySJhlKSbDuiomy\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\GWySJhlKSbDuiomy\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BAJdVDKENAtrC" /t REG_DWORD /d 0 /reg:323⤵PID:784
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BAJdVDKENAtrC" /t REG_DWORD /d 0 /reg:324⤵PID:4796
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BAJdVDKENAtrC" /t REG_DWORD /d 0 /reg:643⤵PID:4468
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FhsMTvRiU" /t REG_DWORD /d 0 /reg:323⤵PID:200
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FhsMTvRiU" /t REG_DWORD /d 0 /reg:643⤵PID:2868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GLXYdpiECluCPYQiXJR" /t REG_DWORD /d 0 /reg:323⤵PID:1240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GLXYdpiECluCPYQiXJR" /t REG_DWORD /d 0 /reg:643⤵PID:1244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RFxCBGtTODaU2" /t REG_DWORD /d 0 /reg:323⤵PID:5116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RFxCBGtTODaU2" /t REG_DWORD /d 0 /reg:643⤵PID:380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iFIQBiuMTZUn" /t REG_DWORD /d 0 /reg:323⤵PID:4540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iFIQBiuMTZUn" /t REG_DWORD /d 0 /reg:643⤵PID:4392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\DVkSBBtutEOgdaVB /t REG_DWORD /d 0 /reg:323⤵PID:3448
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\DVkSBBtutEOgdaVB /t REG_DWORD /d 0 /reg:643⤵PID:2256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:168
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\vBQZIWFuokkDzStmV /t REG_DWORD /d 0 /reg:323⤵PID:4596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\vBQZIWFuokkDzStmV /t REG_DWORD /d 0 /reg:643⤵PID:4744
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\GWySJhlKSbDuiomy /t REG_DWORD /d 0 /reg:323⤵PID:1388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\GWySJhlKSbDuiomy /t REG_DWORD /d 0 /reg:643⤵PID:5028
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJqEgvsxj" /SC once /ST 00:45:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Scheduled Task/Job: Scheduled Task
PID:1200
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gJqEgvsxj"2⤵PID:1668
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJqEgvsxj"2⤵PID:1480
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FeXuZZpzPKWOhLEOt" /SC once /ST 00:14:46 /RU "SYSTEM" /TR "\"C:\Windows\Temp\GWySJhlKSbDuiomy\pbDASbhhELNebkI\EOyfjeO.exe\" 2o /nDlLdidDM 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:3404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "FeXuZZpzPKWOhLEOt"2⤵PID:356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 8202⤵
- Program crash
PID:912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4712
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:2012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5076
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1640
-
C:\Windows\Temp\GWySJhlKSbDuiomy\pbDASbhhELNebkI\EOyfjeO.exeC:\Windows\Temp\GWySJhlKSbDuiomy\pbDASbhhELNebkI\EOyfjeO.exe 2o /nDlLdidDM 525403 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4412 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bhUbGthiAMRPkmWnMY"2⤵PID:4232
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:1800
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:716
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\FhsMTvRiU\xwyKHj.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "KxUrKUaAkxiIWMn" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:4360
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KxUrKUaAkxiIWMn2" /F /xml "C:\Program Files (x86)\FhsMTvRiU\TvhGqwN.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4332
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "KxUrKUaAkxiIWMn"2⤵PID:3384
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "KxUrKUaAkxiIWMn"2⤵PID:2924
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "UAXeSHDGiavXDg" /F /xml "C:\Program Files (x86)\RFxCBGtTODaU2\HpntRKF.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4520
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "GmmQKSnGaFrox2" /F /xml "C:\ProgramData\DVkSBBtutEOgdaVB\vEHqgoz.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4216
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "veWGYsFZYkOvwtypv2" /F /xml "C:\Program Files (x86)\GLXYdpiECluCPYQiXJR\kbLPgDi.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3196
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sLtWyyzpweTdXziPJVs2" /F /xml "C:\Program Files (x86)\BAJdVDKENAtrC\IyyPgVx.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "wSubePrCNeRTDDIwm" /SC once /ST 02:38:32 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\GWySJhlKSbDuiomy\rlqqdNzs\rfUJcsN.dll\",#1 /wldidv 525403" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "wSubePrCNeRTDDIwm"2⤵PID:4748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FeXuZZpzPKWOhLEOt"2⤵PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9282⤵
- Program crash
PID:5032
-
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\GWySJhlKSbDuiomy\rlqqdNzs\rfUJcsN.dll",#1 /wldidv 5254031⤵PID:5028
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\GWySJhlKSbDuiomy\rlqqdNzs\rfUJcsN.dll",#1 /wldidv 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:4416 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "wSubePrCNeRTDDIwm"3⤵PID:1272
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
2KB
MD535c3e8220c468cb376f6511b272a3d36
SHA169e1574cb0558db76643385dd8d0872d3d95f255
SHA256db59c742ee359c04f2439906d006b78e04294eb442ea15ad488dea6ffd4558bf
SHA5120f0fbb7e83a8c51df9f479b63222ac91d821afd8677ea3c5776310b3182a184f4e9bd965d7a2b01c5296a172d5b8480197bbbe9d4dd07a1d6433a045af0513f1
-
Filesize
2KB
MD5b2376ae78899d24bd75475efd1d6377b
SHA131f58dfe183561c4e5faa85e9adda7080c12c93b
SHA25669c1bcfa9084edffd173070d0a545df30198bf9281091d25a14be50cb318982b
SHA512dc876edfd55b68f93016994074745f9ec87ac347ac14908920869ccaf0cb48e31376a82e19b0645f119d642a188bcfa084a7963208c037df0450f0b5d8f6b9ed
-
Filesize
2KB
MD5b6ad9505536faa5fb9ce040682d972e6
SHA19dba9ed29590f1ad0419eabf6f81e786a8e92146
SHA256f81f6ce679c4bbed2346890c693b8a7190322df8eff3dfced1a5d0cc640a7021
SHA5125b2ae434d3e29d9fe88161bdd961ed402870762450bff4608aaab4297aa0574ab88712d6efa877931cde7fd031b110609dd332bd646c703f268fffaa62b2c737
-
Filesize
2KB
MD5e71bc7c34bd59c2acb1441ffa6ce14e9
SHA10727f567438f328257a6f2e0df8b6e961878a583
SHA256ffbdcc126f64953f4a86b31f690ed530221f7518a72f6ff517caf81c7199382b
SHA51287b1972a7fe20e133f3ced04f9aa2cc63c5014105bf10d8514feb515f1f8089b5d83aec219cd2faeb586d94e1f5590bd5dc01b59bfdaa0453d3aa730a7830354
-
Filesize
2.0MB
MD52c22c9889cd6319fddf3e59e2982c8e2
SHA1d155c5581747518cf134806c1794fccedffe191a
SHA256fd47914b53e3082d35754a727b97e0656047b76a29b3bfb789c26dffe3b03460
SHA512317da9c81f1f79eb4ac07dc059a6164019b0737d2747abf0f35776e6565770a087aee1dddba6b7fa068ef48ea41d094f698cd390140372699384632f8e42e8fd
-
Filesize
2KB
MD54c4255e68e0365a1b01202c2dd7e3603
SHA1735e0654640894e4bb3dc01a5e864978cbeae745
SHA2561995866dfde86d31cf8f4a8cbd93721bcb675516ed73e932d256774f470d230e
SHA5121ef9a27a7e1646f2a945a0e2bb4db35f2ab51aeeef828852256caa39872360f64e69805ee557a52eccaffae290aa54c85a87dcde7d4279b5a00c0d5caf75a96c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5132bfc312a5fbe7246d71bab047857bf
SHA12cf51ec8f802f09359734cc0b2cd71bfbf99bc3b
SHA25665a5ee2bb1a5b2a62d77ac8a95ddb521cc747ffa5f488c64ba0938c865f4342a
SHA51292b4ad7237e6f276fe040fce43adf4418295f80ae81892da486abe56d9243308c3aa723570228b1285c9021cae82f10aab472e6ab53941ba149d91e60a9f39cd
-
Filesize
12KB
MD5181a9ed96132fc5576af660002d9baf6
SHA15aa125b1fdfa421515aa8cda3b42513d208381dc
SHA256d6fe9bff8fc0a490e28267d55f93a187bff3167c6c4a03d90109294a6446ecbf
SHA5128433dea51b0f4454911f6355777cf37ac6a084421f733f01602c63d7b88d6b1c35de4557c40314bc8e17d425a0064c913b987ca45788b411664949b0aa73c52e
-
Filesize
6.4MB
MD5ef4641982558a8f7b2281d18b0b3b4f0
SHA1777aeaf5576f15e804115721637687a9083f3bf0
SHA2567f1e409a3e4f64e983d9cac58d6e6d6ada7ff5eb3204d8b215b091811e3530dc
SHA51282c0d7da25cdea208272705fade244984d6c87a9ac2731f9549bb2211120cf858014ee8ca8a32e081d858a1418779e74866cfbc3c6c58fb24967b0c60fc2b428
-
Filesize
6.7MB
MD528233431ecce9eeb655875f0dae4ff1c
SHA1d9007d9a4539bdac35931b16eedc3adb9ea60998
SHA256ac438722efaebae88783430ddda11386fb077c99d28a12d8334da537b7f3d110
SHA5122610ff7482e59c54b3264641d20eaa8e1700967277c8f4e051c3248edb496b9999a0c07822c345e1e41e35377098cf37f75d6cad515d435e1aaf8d9199995a23
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
6KB
MD517f809cb2a12e204a8dbb057e3adfd75
SHA1ec7285282c684db2526de6c93cd620664c2664a7
SHA25677e39086310713e0415928d66988f3308471d737d9b9605bc6c246ea904147c1
SHA51245a23b0a08dbd860f97a9792243f85dd6453d6d9f950ad189f4740abdf72773fb8c0d5f7ff69e00e2089284e5b4baaa080dfeb935b2b9d34cb79e4c417cda478
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD5e33ed3d4cc9b2e5a08ae25747ef47620
SHA1e2f4cfdd39bcb2eb1c05648a37a3d8536eaf19b7
SHA2560e7093450fb6bb5201b4291033daf6099881421ab47b122972e0249ef5b45a4f
SHA5129e990f7ca202c7ecc7a21dd2433055b71bd62f2e524f4702b674316effeb8fa37e891d40f3e6a960380dd7967033c7a7f235e73a3c434e97495e532309b4f95e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize12KB
MD5ef90f1e0209ad33d02bb02ba6a1d8d51
SHA193ee7085e3aa369d09f67b9dd4ba531233168546
SHA2562dbcd8c8c9f7cf746e3758a5c0c0f209adf0e2101ae22f8901295e8c4e6785ba
SHA51249029c19d60bcc67e93e421425103a86762f8437782e00c687542e7a796b326c1e383f739724128876b288517c62633f0d32e18f92569cbebd5f73ffb3507b91
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize12KB
MD55133148cb718b69600b41bbe706a8f54
SHA1c8573c4d78ca15e6c8124f9dd9b37e3ec6d3284f
SHA256846c42b8d23bd876348bc72b26687d45f3108c2a2e70409b3c62e77b4b0fa0d8
SHA512e40cf31c5120c4438782198032ea804b925ffba4001a1377c926a80f6748f707aba31d31a7a7983b7301feee44dbceb3b6e935d6d42bcb3c524227e7883be5cd
-
Filesize
6.5MB
MD5220e81c1ec31031d19b7bd86c8e16dac
SHA179813f7dab7991046300767742229aaa8952705c
SHA2565cf19ead798fc21636abb39f473e3afb2563aec5af0857d3f5fe7d04aa9a6fe1
SHA512430a2069d0af3396ea79b66da0159fcb348393799e5f42a15f6b2a12ad1f5f5151ec9f81ed7c5073b2705d91287ea5ff9593e9ddb6fb88dd06ed20507ec41491
-
Filesize
6KB
MD535267601a1affaca590265353f5153ff
SHA1b61dc71440b57e0253e1547f18876c61e33d81aa
SHA256b8dc851f1b97693f6be2ff57aa2d72db88bd9ff6e723eac77e619c7cba8863df
SHA51249145ea9d2ac6198a0333f0b232b5f9ce16144e264cbf9010fb1c83ba636b032f51b1e65fc0fc6d47fc0e0aff2facf34eebdf58b81458043ced3cc410c802185